{"id":114789,"date":"2025-07-25T12:39:13","date_gmt":"2025-07-25T04:39:13","guid":{"rendered":"https:\/\/version-2.com\/?p=114789"},"modified":"2025-07-24T12:41:56","modified_gmt":"2025-07-24T04:41:56","slug":"how-traceloop-protected-its-llm-dev-workflow-and-met-soc2-compliance","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2025\/07\/how-traceloop-protected-its-llm-dev-workflow-and-met-soc2-compliance\/","title":{"rendered":"How Traceloop protected its LLM dev workflow and met SOC2 compliance"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"114789\" class=\"elementor elementor-114789\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/content.nordlayer.com\/uploads\/Blog_cover_c2cefd72aa.webp\" width=\"2800\" height=\"1600\" \/><\/p><div class=\"Grid_item__b3BBG Grid_col9Lg__8Rrwm BlogArticle_contentGrid__cESsj\"><div class=\"BlogArticle_articleSummary__Orlgt\"><div class=\"ArticleSummary_markdownWrapper__Wj_mp\"><p class=\"Text_text___v2aO Markdown_paragraph__sc4Gl ArticleSummary_paragraph___u7mV Text_bodyColor__a4VTo\" data-testid=\"text\"><strong class=\"Markdown_strong__Rxk9v ArticleSummary_strong___vw_3\">Summary:<\/strong> Learn how Traceloop locked down AWS access, passed SOC 2 compliance, and saved hours with NordLayer\u2019s dedicated IP.<\/p><\/div><\/div><div id=\"section-1\"><div class=\"ArticleImage_root__KtuDJ BlogArticle_articleImage__qw2Gm\"><img decoding=\"async\" class=\"ArticleImage_image__L_45g\" src=\"https:\/\/content.nordlayer.com\/uploads\/Results_at_a_glance_37679f2912.webp\" sizes=\"(max-width: 500px) 500px, (max-width: 750px) 750px, (max-width: 1000px) 1000px, 100vw\" srcset=\"https:\/\/content.nordlayer.com\/uploads\/large_Results_at_a_glance_37679f2912.webp 1000w, https:\/\/content.nordlayer.com\/uploads\/small_Results_at_a_glance_37679f2912.webp 500w, https:\/\/content.nordlayer.com\/uploads\/medium_Results_at_a_glance_37679f2912.webp 750w, https:\/\/content.nordlayer.com\/uploads\/Results_at_a_glance_37679f2912.webp\" alt=\"Results at a glance. 1 year of using NordLayer. 100% of employees secured. IT hours saved weekly. SOC 2 compliance support. Secured access to AWS cloud environments\" \/><\/div><\/div><div id=\"section-2\"><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Established in 2022, <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/www.traceloop.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Traceloop<\/a> is a seed-stage startup based in Israel. It creates platforms that help companies worldwide build and improve their large language model (LLM) apps. The team consists of eight on-site employees and one remote worker based in Ukraine.<\/p><\/div><div id=\"section-3\"><div class=\"ArticleImage_root__KtuDJ BlogArticle_articleImage__qw2Gm\"><img decoding=\"async\" class=\"ArticleImage_image__L_45g\" src=\"https:\/\/content.nordlayer.com\/uploads\/Profile_of_Traceloop_a7eb722540.webp\" sizes=\"(max-width: 500px) 500px, (max-width: 750px) 750px, (max-width: 1000px) 1000px, 100vw\" srcset=\"https:\/\/content.nordlayer.com\/uploads\/large_Profile_of_Traceloop_a7eb722540.webp 1000w, https:\/\/content.nordlayer.com\/uploads\/small_Profile_of_Traceloop_a7eb722540.webp 500w, https:\/\/content.nordlayer.com\/uploads\/medium_Profile_of_Traceloop_a7eb722540.webp 750w, https:\/\/content.nordlayer.com\/uploads\/Profile_of_Traceloop_a7eb722540.webp\" alt=\"Focus features: Server with a dedicated IP. 2022 Year of establishment. Service scale: Global. Team presence: Tel-Aviv, Israel, Ukraine. Work policy On-site, Remote. Industry sector: Software that helps build and manage Al-powered apps\" \/><\/div><\/div><div id=\"section-4\"><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Before NordLayer, Traceloop didn\u2019t have any security solution in place. And like many early-stage startups, its team focused exclusively on building products.<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Knowing that their <strong class=\"Markdown_strong__Rxk9v\">SOC 2 compliance audit<\/strong> was fast approaching, they needed a reliable and scalable solution that:<\/p><ul class=\"SharedArticleMarkdownComponents_list__7fmEv SharedArticleMarkdownComponents_horizontalSpacing__ayEp5 List_list__ysCsa\"><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div>Helps secure access to their AWS-managed Kubernetes clusters<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div>Supports SOC 2 compliance<\/div><\/li><\/ul><h2 id=\"the-challenge-securing-access-to-devops-environments\" class=\"Heading_root__WNfE8 Heading_heading30__zsK4j Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading2__1AkXN SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">The challenge: Securing access to DevOps environments<\/h2><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">We spoke with <strong class=\"Markdown_strong__Rxk9v\">Gal Kleinman, CTO and co-founder of Traceloop<\/strong>, about when security became a priority.<\/p><\/div><div id=\"section-5\"><div class=\"ArticleDefinitionBox_root__IzeWW BlogArticle_definitionBox__Slla6\"><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1\" data-testid=\"text\"><em>\u201cWe\u2019ve always cared about security, but SOC 2 made us realize we needed tighter access controls to our cloud environments.\u201d<\/em><\/p><\/div><\/div><div id=\"section-6\"><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">The biggest issue was that their Kubernetes clusters were accessible from anywhere using AWS Command Line Interface (CLI), with no IP restrictions. Manually restricting access would\u2019ve slowed down the team and introduced bottlenecks for developers.<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">They needed a solution that offers <strong class=\"Markdown_strong__Rxk9v\">a server with a<\/strong> <strong class=\"Markdown_strong__Rxk9v\">dedicated IP<\/strong>, works seamlessly with AWS, and could be <strong class=\"Markdown_strong__Rxk9v\">set up in minutes,<\/strong> not days.<\/p><\/div><div id=\"section-8\"><h2 id=\"how-nordlayer-helped-traceloop\" class=\"Heading_root__WNfE8 Heading_heading30__zsK4j Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading2__1AkXN SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">How NordLayer helped Traceloop<\/h2><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Traceloop needed a fast, reliable way to secure access to its cloud environments without adding unnecessary cost or complexity. As Gal Kleinman explains:<\/p><\/div><div id=\"section-9\"><div class=\"ArticleDefinitionBox_root__IzeWW BlogArticle_definitionBox__Slla6\"><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1\" data-testid=\"text\"><em>\u201cWith NordLayer, our team can now securely access our cloud resources, and I don\u2019t have to spend much time managing it.\u201d<\/em><\/p><\/div><\/div><div id=\"section-10\"><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Traceloop deployed NordLayer\u2019s <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/features\/dedicated-ip\/\">server with a dedicated IP<\/a>, which was assigned to the company through a <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/features\/private-gateway\/\">Virtual Private Gateway<\/a>.<\/p><\/div><div id=\"section-11\"><div class=\"ArticleImage_root__KtuDJ BlogArticle_articleImage__qw2Gm\"><img decoding=\"async\" class=\"ArticleImage_image__L_45g\" src=\"https:\/\/content.nordlayer.com\/uploads\/Nord_Layer_Control_Panel_Network_Gateways_69a903a714.webp\" sizes=\"(max-width: 500px) 500px, (max-width: 750px) 750px, (max-width: 1000px) 1000px, 100vw\" srcset=\"https:\/\/content.nordlayer.com\/uploads\/large_Nord_Layer_Control_Panel_Network_Gateways_69a903a714.webp 1000w, https:\/\/content.nordlayer.com\/uploads\/small_Nord_Layer_Control_Panel_Network_Gateways_69a903a714.webp 500w, https:\/\/content.nordlayer.com\/uploads\/medium_Nord_Layer_Control_Panel_Network_Gateways_69a903a714.webp 750w, https:\/\/content.nordlayer.com\/uploads\/Nord_Layer_Control_Panel_Network_Gateways_69a903a714.webp\" alt=\"NordLayer Control Panel Network Gateways\" \/><\/div><\/div><div id=\"section-12\"><h2 id=\"benefit-1-fast-nordlayers-deployment\" class=\"Heading_root__WNfE8 Heading_heading30__zsK4j Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading2__1AkXN SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">Benefit 1: Fast NordLayer\u2019s deployment<\/h2><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Traceloop was looking for a solution that was easy to use and set up. NordLayer\u2019s deployment was simple:<\/p><ul class=\"SharedArticleMarkdownComponents_list__7fmEv SharedArticleMarkdownComponents_horizontalSpacing__ayEp5 List_list__ysCsa\"><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div>Log in to NordLayer.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div>Invite the team members.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div>They click the link, download the app, and it installs automatically.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div>Within minutes, they\u2019re securely connected.<\/div><\/li><\/ul><\/div><div id=\"section-13\"><div class=\"ArticleDefinitionBox_root__IzeWW BlogArticle_definitionBox__Slla6\"><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1\" data-testid=\"text\"><em>\u201cEverything took four or five minutes\u2014start to finish.\u201d<\/em><\/p><\/div><\/div><div id=\"section-14\"><h2 id=\"benefit-2-secure-cloud-access-with-a-dedicated-ip\" class=\"Heading_root__WNfE8 Heading_heading30__zsK4j Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading2__1AkXN SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">Benefit 2: Secure cloud access with a dedicated IP<\/h2><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">To secure AWS access and meet SOC 2 compliance, Traceloop assigned a <strong class=\"Markdown_strong__Rxk9v\">server with a dedicated IP to the Virtual Private Gateway.<\/strong> This ensured the whole team could connect through the same IP address, regardless of where they were.<\/p><\/div><div id=\"section-15\"><div class=\"ArticleImage_root__KtuDJ BlogArticle_articleImage__qw2Gm\"><img decoding=\"async\" class=\"ArticleImage_image__L_45g\" src=\"https:\/\/content.nordlayer.com\/uploads\/Popup_of_Nord_Layer_Control_Panel_Network_Gateways_5db218f1c7.webp\" sizes=\"(max-width: 500px) 500px, (max-width: 750px) 750px, (max-width: 1000px) 1000px, 100vw\" srcset=\"https:\/\/content.nordlayer.com\/uploads\/large_Popup_of_Nord_Layer_Control_Panel_Network_Gateways_5db218f1c7.webp 1000w, https:\/\/content.nordlayer.com\/uploads\/small_Popup_of_Nord_Layer_Control_Panel_Network_Gateways_5db218f1c7.webp 500w, https:\/\/content.nordlayer.com\/uploads\/medium_Popup_of_Nord_Layer_Control_Panel_Network_Gateways_5db218f1c7.webp 750w, https:\/\/content.nordlayer.com\/uploads\/Popup_of_Nord_Layer_Control_Panel_Network_Gateways_5db218f1c7.webp\" alt=\"Popup of NordLayer Control Panel Network Gateways\" \/><\/div><\/div><div id=\"section-16\"><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">For a small team managing security themselves, this <strong class=\"Markdown_strong__Rxk9v\">simplicity<\/strong> was a huge benefit. Setup was fast and straightforward. And they met all SOC 2 requirements without disrupting workflows or slowing down product development.<\/p><h2 id=\"results\" class=\"Heading_root__WNfE8 Heading_heading30__zsK4j Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading2__1AkXN SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">Results<\/h2><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">After one year of using NordLayer, Traceloop achieved the following results:<\/p><ul class=\"SharedArticleMarkdownComponents_list__7fmEv SharedArticleMarkdownComponents_horizontalSpacing__ayEp5 List_list__ysCsa\"><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Locked-down cloud access:<\/strong> Secure access to staging and production environments.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">SOC 2 compliance support:<\/strong> Fast, compliant access controls for audit readiness.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Scales with the team:<\/strong> 8 out of 9 team members use NordLayer daily, and the setup is quick and effortless.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Many IT hours saved:<\/strong> NordLayer is easy to use and streamlines Traceloop\u2019s workflows.<\/div><\/li><\/ul><\/div><div id=\"section-17\"><div class=\"ArticleDefinitionBox_root__IzeWW BlogArticle_definitionBox__Slla6\"><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1\" data-testid=\"text\"><em>\u201cNordLayer gave us a simple way to secure AWS access with a dedicated IP. The whole team connects through the gateway, and I can control access without touching our workflows.\u201d<\/em><\/p><p data-testid=\"text\">\u00a0<\/p><\/div><\/div><div id=\"section-19\"><h2 id=\"why-nordlayer-works-for-traceloop\" class=\"Heading_root__WNfE8 Heading_heading30__zsK4j Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading2__1AkXN SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">Why NordLayer works for Traceloop<\/h2><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">NordLayer was the perfect fit for Traceloop because it delivered exactly what the team needed: <strong class=\"Markdown_strong__Rxk9v\">simplicity, security,<\/strong> and zero disruption to developer workflows.<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">As a small startup without a dedicated IT team, Traceloop needed a solution that just worked, right out of the box:<\/p><ul class=\"SharedArticleMarkdownComponents_list__7fmEv SharedArticleMarkdownComponents_horizontalSpacing__ayEp5 List_list__ysCsa\"><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Secure access with a dedicated IP.<\/strong> Locked down staging and production, eliminating open endpoints.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Set-up in minutes.<\/strong> NordLayer was fully deployed in under five minutes.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Works with existing tools.<\/strong> Integrated seamlessly with AWS Command Line Interface (CLI), so the team didn\u2019t have to change how they work.<\/div><\/li><\/ul><h2 id=\"pro-cybersecurity-tips\" class=\"Heading_root__WNfE8 Heading_heading30__zsK4j Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading2__1AkXN SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">Pro cybersecurity tips<\/h2><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Gal Kleinman, CTO and co-founder of Traceloop, shared a few cybersecurity tips with us:<\/p><ul class=\"SharedArticleMarkdownComponents_list__7fmEv SharedArticleMarkdownComponents_horizontalSpacing__ayEp5 List_list__ysCsa\"><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Keep it simple.<\/strong> Choose security tools that are easy to implement and use. Avoid overcomplicated setups that drain time and energy.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Protect without disrupting.<\/strong> Security measures should work quietly in the background, not block workflows or frustrate developers.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Balance security and speed.<\/strong> The best tools protect your systems and let your team move fast.<\/div><\/li><\/ul><\/div><div id=\"section-20\"><div class=\"ArticleImage_root__KtuDJ BlogArticle_articleImage__qw2Gm\"><img decoding=\"async\" class=\"ArticleImage_image__L_45g\" src=\"https:\/\/content.nordlayer.com\/uploads\/Quote_by_Gal_Kleinman_50d1128af3.webp\" sizes=\"(max-width: 500px) 500px, (max-width: 750px) 750px, (max-width: 1000px) 1000px, 100vw\" srcset=\"https:\/\/content.nordlayer.com\/uploads\/large_Quote_by_Gal_Kleinman_50d1128af3.webp 1000w, https:\/\/content.nordlayer.com\/uploads\/small_Quote_by_Gal_Kleinman_50d1128af3.webp 500w, https:\/\/content.nordlayer.com\/uploads\/medium_Quote_by_Gal_Kleinman_50d1128af3.webp 750w, https:\/\/content.nordlayer.com\/uploads\/Quote_by_Gal_Kleinman_50d1128af3.webp\" alt=\"Quote: &quot;Keep it simple. Choose security tools that are easy to implement and use. Avoid overcomplicated setups that drain time and energy.&quot;\" \/><\/div><\/div><div id=\"section-21\"><h2 id=\"conclusion\" class=\"Heading_root__WNfE8 Heading_heading30__zsK4j Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading2__1AkXN SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">Conclusion<\/h2><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Traceloop chose NordLayer to <strong class=\"Markdown_strong__Rxk9v\">secure its AWS access<\/strong> and <strong class=\"Markdown_strong__Rxk9v\">streamline SOC 2 compliance<\/strong> without disrupting the team\u2019s daily work.<\/p><\/div><div id=\"section-22\"><div class=\"ArticleDefinitionBox_root__IzeWW BlogArticle_definitionBox__Slla6\"><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1\" data-testid=\"text\"><em>\u201cNordLayer gave me exactly what I needed\u2014a dedicated IP, fast setup, and no disruption to how our team works.\u201d<\/em><\/p><\/div><\/div><div id=\"section-23\"><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">With NordLayer, Traceloop gained secure cloud access and an easy way to scale security as the team grows.<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Need to secure your cloud workflows without slowing your team down? Learn how NordLayer can help you with that.<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\"><a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/contact-sales\/\">Talk to our sales team<\/a> to find the right plan for your team.<\/p><p data-testid=\"text\">\u00a0<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9e34e91 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"9e34e91\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb2c932\" data-id=\"bb2c932\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bfd91ca elementor-widget elementor-widget-shortcode\" data-id=\"bfd91ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Summary: Learn how Traceloop locked down AWS access, pa [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1130,1305,61],"tags":[974,1077,1132],"class_list":["post-114789","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-nordlayer","category-1305","category-press-release","tag-nord-security","tag-1077","tag-nordlayer"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Traceloop protected its LLM dev workflow and met SOC2 compliance - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/case-study-traceloop-and-nordlayer\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Traceloop protected its LLM dev workflow and met SOC2 compliance - Version 2\" \/>\n<meta property=\"og:description\" content=\"Summary: Learn how Traceloop locked down AWS access, pa [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/case-study-traceloop-and-nordlayer\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-25T04:39:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/content.nordlayer.com\/uploads\/Blog_cover_c2cefd72aa.webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-traceloop-and-nordlayer\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/07\\\/how-traceloop-protected-its-llm-dev-workflow-and-met-soc2-compliance\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"How Traceloop protected its LLM dev workflow and met SOC2 compliance\",\"datePublished\":\"2025-07-25T04:39:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/07\\\/how-traceloop-protected-its-llm-dev-workflow-and-met-soc2-compliance\\\/\"},\"wordCount\":786,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-traceloop-and-nordlayer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/content.nordlayer.com\\\/uploads\\\/Blog_cover_c2cefd72aa.webp\",\"keywords\":[\"Nord Security\",\"2025\",\"NordLayer\"],\"articleSection\":[\"Nord Security\",\"NordLayer\",\"2025\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/07\\\/how-traceloop-protected-its-llm-dev-workflow-and-met-soc2-compliance\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-traceloop-and-nordlayer\\\/\",\"name\":\"How Traceloop protected its LLM dev workflow and met SOC2 compliance - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-traceloop-and-nordlayer\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-traceloop-and-nordlayer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/content.nordlayer.com\\\/uploads\\\/Blog_cover_c2cefd72aa.webp\",\"datePublished\":\"2025-07-25T04:39:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-traceloop-and-nordlayer\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-traceloop-and-nordlayer\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-traceloop-and-nordlayer\\\/#primaryimage\",\"url\":\"https:\\\/\\\/content.nordlayer.com\\\/uploads\\\/Blog_cover_c2cefd72aa.webp\",\"contentUrl\":\"https:\\\/\\\/content.nordlayer.com\\\/uploads\\\/Blog_cover_c2cefd72aa.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-traceloop-and-nordlayer\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Traceloop protected its LLM dev workflow and met SOC2 compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Traceloop protected its LLM dev workflow and met SOC2 compliance - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/case-study-traceloop-and-nordlayer\/","og_locale":"zh_HK","og_type":"article","og_title":"How Traceloop protected its LLM dev workflow and met SOC2 compliance - Version 2","og_description":"Summary: Learn how Traceloop locked down AWS access, pa [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/case-study-traceloop-and-nordlayer\/","og_site_name":"Version 2","article_published_time":"2025-07-25T04:39:13+00:00","og_image":[{"url":"https:\/\/content.nordlayer.com\/uploads\/Blog_cover_c2cefd72aa.webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"6 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/case-study-traceloop-and-nordlayer\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/07\/how-traceloop-protected-its-llm-dev-workflow-and-met-soc2-compliance\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"How Traceloop protected its LLM dev workflow and met SOC2 compliance","datePublished":"2025-07-25T04:39:13+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/07\/how-traceloop-protected-its-llm-dev-workflow-and-met-soc2-compliance\/"},"wordCount":786,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/case-study-traceloop-and-nordlayer\/#primaryimage"},"thumbnailUrl":"https:\/\/content.nordlayer.com\/uploads\/Blog_cover_c2cefd72aa.webp","keywords":["Nord Security","2025","NordLayer"],"articleSection":["Nord Security","NordLayer","2025","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/07\/how-traceloop-protected-its-llm-dev-workflow-and-met-soc2-compliance\/","url":"https:\/\/nordlayer.com\/blog\/case-study-traceloop-and-nordlayer\/","name":"How Traceloop protected its LLM dev workflow and met SOC2 compliance - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/case-study-traceloop-and-nordlayer\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/case-study-traceloop-and-nordlayer\/#primaryimage"},"thumbnailUrl":"https:\/\/content.nordlayer.com\/uploads\/Blog_cover_c2cefd72aa.webp","datePublished":"2025-07-25T04:39:13+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/case-study-traceloop-and-nordlayer\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/case-study-traceloop-and-nordlayer\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/nordlayer.com\/blog\/case-study-traceloop-and-nordlayer\/#primaryimage","url":"https:\/\/content.nordlayer.com\/uploads\/Blog_cover_c2cefd72aa.webp","contentUrl":"https:\/\/content.nordlayer.com\/uploads\/Blog_cover_c2cefd72aa.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/case-study-traceloop-and-nordlayer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"How Traceloop protected its LLM dev workflow and met SOC2 compliance"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-tRr","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/114789","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=114789"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/114789\/revisions"}],"predecessor-version":[{"id":114793,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/114789\/revisions\/114793"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=114789"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=114789"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=114789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}