ElasticFlow
HubTodos los SkillsPor DepartamentoPor RolPor HerramientaPor MétricaMCPsPublishers
Sitio principalIniciar sesiónRegistrarse
ElasticFlow

Transforma tu negocio con automatización de workflows impulsada por IA. Una plataforma unificada para todas tus necesidades empresariales.

Síguenos

Plataforma

  • Funciones
  • Beneficios
  • Casos de uso
  • Biblioteca de workflows

Casos de uso

  • Ventas
  • Marketing
  • Finanzas y Legal
  • RR. HH.

Catálogo

  • Departamentos
  • Roles
  • Herramientas
  • Métricas
  • Plataformas

Crecimiento

  • Programa de referidos
  • Socios

Legal

  • Política de privacidad
  • Términos de servicio
  • Política de cookies
  • Uso aceptable
  • Seguridad
  • SLA

© 2026 ElasticFlow. Todos los derechos reservados.

ElasticFlow
HubTodos los SkillsPor DepartamentoPor RolPor HerramientaPor MétricaMCPsPublishers
Sitio principalIniciar sesiónRegistrarse
ElasticFlow

Transforma tu negocio con automatización de workflows impulsada por IA. Una plataforma unificada para todas tus necesidades empresariales.

Síguenos

Plataforma

  • Funciones
  • Beneficios
  • Casos de uso
  • Biblioteca de workflows

Casos de uso

  • Ventas
  • Marketing
  • Finanzas y Legal
  • RR. HH.

Catálogo

  • Departamentos
  • Roles
  • Herramientas
  • Métricas
  • Plataformas

Crecimiento

  • Programa de referidos
  • Socios

Legal

  • Política de privacidad
  • Términos de servicio
  • Política de cookies
  • Uso aceptable
  • Seguridad
  • SLA

© 2026 ElasticFlow. Todos los derechos reservados.

ElasticFlow
HubTodos los SkillsPor DepartamentoPor RolPor HerramientaPor MétricaMCPsPublishers
Sitio principalIniciar sesiónRegistrarse
  1. Inicio
  2. Skills
  3. SOC 2 Compliance Expert
Skill de IARun Audit PrepLegal

When SOC 2 audit is 6 months out and your enterprise pipeline depends on the report, walk every TSC control with infrastructure evidence ready. — Claude Skill

Un Skill de Claude para Claude Code por borghei — ejecutar /soc2-compliance-expert en Claude·Actualizado el 22 may 2026·v1.0.0

Compatible conChatGPT·Claude·Gemini·OpenClaw

Walk SOC 2 Trust Services Criteria controls with audit-ready evidence.

  • Covers Type I and Type II: design plus operating effectiveness over 3-12 month observation periods
  • Every TSC category mapped: CC1-CC9 (common criteria), A1 (availability), PI1 (processing integrity), C1 (confidentiality), P1 (privacy)
  • Infrastructure validation: cloud (AWS, GCP, Azure), DNS, TLS, endpoints, CI/CD pipelines
  • Audit evidence collection per control: logs, tickets, screenshots, policy docs
  • Output: gap analysis report plus remediation plan plus auditor-ready evidence index

Para quién es

General Counsel

Walk every TSC control with infrastructure evidence before the auditor lands — no scrambling in week one of the audit

Ver skills para este rol
Corporate Counsel

Get board-ready risk summary and remediation timeline tied to enterprise-customer deal pipeline

Ver skills para este rol

Qué hace

Enterprise customer asked for SOC 2 last quarter

You promised the deal team a Type I report by Q4. A 30-minute gap analysis surfaces the 12 controls that aren't designed yet, the 8 that need policy docs, and the 4 that need infrastructure changes, with remediation timelines.

Type II observation period starts next month

You just finished Type I. The 6-month observation window starts Monday. Walk through which evidence streams need automation (logs, access reviews, change tickets) before the auditor returns, what's still manual, and where the gaps will surface.

CI/CD pipeline doesn't show change-control evidence

CC8 controls (change management) are weak. Walk the GitHub plus deploy pipeline. Surface where to add code-review enforcement, auto-attach Jira ticket numbers to commits, and required CODEOWNERS file structure.

TLS and certificate hygiene for CC6

Logical and physical access controls (CC6.6, CC6.7) require crypto controls. Audit your DNS, TLS configs, certificate expiry tracking, and encryption-at-rest evidence to get the table the auditor expects in the evidence packet.

Cómo funciona

1

Start with a readiness assessment: which TSC categories are in scope (most SaaS does CC1-CC9 plus A1).

2

Map your current controls per criterion. Skill walks each criterion with concrete questions.

3

Surface gaps: controls not yet designed, designed-but-not-operating, operating-but-no-evidence.

4

For each gap: remediation steps, infrastructure validation pattern (cloud, DNS, TLS, endpoints, CI/CD), and target evidence.

5

Output: gap report plus remediation plan ranked by audit risk plus per-criterion evidence index ready for the auditor.

Ejemplo

Audit scope
SaaS PM tool, 280 engineers, hosted on AWS multi-region. Type II audit starts in 4 months. Type I report from 2025. ISMS in place but evidence collection is manual.
30 minutes later
Readiness summary
CC1-CC5 (common criteria): 23/27 controls designed, 4 need policy refresh. CC6-CC9: 21 controls — strong on access controls, weak on change-management evidence (CC8.1-CC8.3). A1 (availability): 5 controls — DR runbooks exist but DR exercise log is missing for 2024.
Top 5 audit-risk gaps
1. CC8.1 — no GitHub PR review enforcement on infrastructure-as-code repo. 2. CC7.4 — vulnerability scan schedule is documented but evidence log not centralised. 3. CC6.8 — no automated user-access review every 90 days. 4. A1.2 — DR exercise from 2024 missing post-mortem doc. 5. PI1.4 — data-validation logic not documented per processing point.
Remediation timeline
Month 1: policy and process docs for CC8 and CC7.4. Month 2: automate CC6.8 access reviews via Okta plus role exports. Month 3: run DR exercise plus write post-mortem. Month 4: dry-run audit walkthrough with all evidence in one drive.
Auditor-ready evidence index
Each criterion maps to a folder: /soc2-evidence/CC8.1/, /CC6.8/, etc. Each folder has README.md describing the control, the evidence files, and a change log.

Métricas que mejora

Compliance Gap Coverage
Surfaces every gap against TSC categories with remediation steps before the auditor finds them
Legal
Strategic vs Reactive Work
Front-loads control work — moves the team from scramble-mode in audit week to scheduled prep months ahead
Legal
Vendor Risk Visibility
Vendor inventory with last-review dates plus SOC 2 status of each subprocessor
Legal

Funciona con

Google Sheets
manual

Control matrix and gap-tracking spreadsheet, exportable to the auditor

Jira
manual

Source of change-management tickets (CC8) and vulnerability tickets (CC7.4)

DocuSign CLM
manual

Subprocessor agreements and policy attestations for CC9 vendor management

Notion
manual

Policy and process documentation; per-criterion evidence index lives in a Notion database

Skills similares

Sugeridos automáticamente por coincidencia de atributos. La comparación lado a lado muestra las diferencias.

Comparar los 4 →

Contract & Proposal Writer

por Alireza Rezvani
↳text, tool-access +1vstext(What you provide)·markdown, csvvsmarkdown, docx(Output formats)·approval-requiredvsreview-required(Human review)

Legal Response from Templates

por Anthropic✓
↳text, tool-access +1vstext(What you provide)·markdown, csvvsmarkdown, email(Output formats)·approval-requiredvsreview-required(Human review)

Meeting Briefing

por Anthropic✓
↳text, tool-access +1vstext(What you provide)·markdown, csvvsmarkdown(Output formats)·approval-requiredvsreview-required(Human review)
Ordenados por coincidencia de atributos × diferenciación. SOC 2 Compliance Expert comparte 12+ atributos con cada uno.

¿Quieres usar SOC 2 Compliance Expert?

Elige cómo empezar.

Ejecutar en Claude Code
Gratis. Código abierto.

Instala y ejecuta este skill localmente en tu computadora.

1
Instalar Claude Code

Abre una terminal en tu computadora y pega este comando:

2
Instalar el skill

Esto descarga el skill con todos sus archivos en tu computadora:

Añade -g al final para tenerlo disponible en todos tus proyectos.

3
Ejecútalo

Inicia Claude Code, luego escribe el comando:

luego
Ver código en GitHub
Usar en ElasticFlow
Funciones de equipo y colaboración

Ejecuta skills desde tu navegador. Comparte resultados, gestiona accesos, colabora con tu equipo. Sin terminal.

Prueba gratuita de 14 días. Cancela cuando quieras.

View on GitHub

SOC 2 Compliance Expert

SOC 2 Type I and Type II compliance management covering all Trust Services Criteria (TSC), infrastructure security validation, evidence collection, and end-to-end audit preparation.


SOC 2 Overview

Type I vs Type II

AspectType IType II
ScopeDesign of controls at a point in timeDesign AND operating effectiveness over a period
DurationSingle date (snapshot)Observation period (3-12 months, typically 6-12)
Cost$20K-$60K (first audit)$40K-$150K (first audit)
Timeline1-3 months6-15 months (includes observation period)
Customer PreferenceEarly-stage acceptableEnterprise customers require

Start with Type I to validate control design, then transition to Type II within 6 months.

Trust Services Criteria Summary

CategoryFocusControls
CC1-CC5Common Criteria (COSO-based)Control environment, communication, risk, monitoring, control activities
CC6Logical and Physical AccessAuthentication, authorization, physical security, encryption
CC7System OperationsVulnerability management, monitoring, incident response, BCP
CC8Change ManagementAuthorization, testing, deployment controls
CC9Risk MitigationVendor management, business disruption, risk transfer
A1AvailabilityCapacity planning, DR, recovery testing
PI1Processing IntegrityData validation, error handling, reconciliation
C1ConfidentialityClassification, encryption, disposal
P1PrivacyNotice, consent, data subject rights, retention

For detailed control requirements per category, see REFERENCE.md.


Readiness Assessment Workflow

The agent guides organizations through SOC 2 readiness from gap analysis through audit completion.

Workflow: Phase 1 -- Gap Analysis (Weeks 1-4)

  1. Define scope -- determine which TSC categories to include (Security is mandatory), define system boundaries, identify subservice organizations (carve-out vs. inclusive), document principal service commitments.
  2. Assess current state -- inventory existing policies and procedures, map current controls to TSC requirements, interview process owners and control operators.
  3. Run automated gap analysis using scripts/soc2_readiness_checker.py.
  4. Document gaps -- missing controls, controls lacking evidence, controls not operating effectively.
  5. Prioritize gaps by risk level and remediation effort.
  6. Validation checkpoint: Gap analysis covers all in-scope TSC categories; each gap has severity rating and remediation owner assigned.

Workflow: Phase 2 -- Remediation (Weeks 5-16)

  1. Develop/update policies -- information security policy, supporting procedures per control domain, policy review and approval workflows.
  2. Implement technical controls -- configure IdP with SSO/MFA enforcement, deploy endpoint security (MDM, EDR, disk encryption), implement SIEM logging and monitoring, configure backup and DR, harden cloud infrastructure.
  3. Establish processes -- access review procedures, change management workflow, incident response procedures, vendor management program, security awareness training.
  4. Set up evidence collection -- configure automated collection, establish repository structure, define refresh cadence per TSC category.
  5. Validation checkpoint: All identified gaps remediated; technical controls verified via scripts/soc2_infrastructure_auditor.py; evidence collection producing artifacts.

Workflow: Phase 3 -- Pre-Audit (Weeks 17-20)

  1. Conduct internal readiness assessment -- mock audit against all in-scope TSC, validate evidence completeness and quality, run infrastructure auditor for technical validation.
  2. Remediate pre-audit findings -- address remaining gaps, strengthen evidence.
  3. Select and engage CPA firm -- negotiate scope, timeline, fees; schedule kickoff; prepare system description draft.
  4. Validation checkpoint: Mock audit passes with no critical gaps; system description reviewed; auditor engaged.

Workflow: Phase 4 -- Audit Execution

  1. Type I audit (if applicable) -- auditor reviews control design; management provides assertions; address findings before Type II.
  2. Type II observation period (3-12 months) -- controls operate consistently, evidence collected continuously, quarterly self-assessments, regular auditor check-ins.
  3. Fieldwork (2-4 weeks) -- auditor selects samples, tests controls, interviews personnel; draft report review; final report issuance.
  4. Validation checkpoint: Clean opinion received; any findings have management response and remediation plan.

Evidence Collection Framework

Evidence by TSC Category

TSCEvidence TypeCollection MethodRefresh
CC1Code of conduct acknowledgmentsHR system exportAnnual
CC2Security awareness training recordsLMS exportOngoing
CC3Risk assessment report, risk registerGRC platformAnnual/Quarterly
CC4Penetration test reports, vulnerability scansThird-party/scannerAnnual/Monthly
CC5Policy documents with version historyPolicy managementAnnual review
CC6Access reviews, MFA enrollment, offboardingIAM/IdP/HRISQuarterly/Per event
CC7Vulnerability remediation, incident recordsTicketing/ITSMOngoing
CC8Change tickets with approvals, code reviewsITSM/GitPer change
CC9Vendor risk assessments, vendor SOC 2 reportsGRC platformAnnual
A1Uptime reports, DR tests, backup logsMonitoring/backupMonthly/Semi-annual
PI1Data validation/reconciliation reportsApplication logsPer process
C1Data classification inventory, encryption configsManual/automatedAnnual/Quarterly
P1PIAs, DSR response trackingPrivacy toolPer event

Example: Evidence Collection Command

# Generate evidence checklist for all TSC categories
python scripts/evidence_collector.py --generate-checklist --categories all

# Track evidence status
python scripts/evidence_collector.py --status evidence-tracker.json

# Update specific evidence item
python scripts/evidence_collector.py --update evidence-tracker.json \
  --item CC6.1-MFA --status collected

# Generate readiness dashboard
python scripts/evidence_collector.py --dashboard evidence-tracker.json

# Export for auditor review
python scripts/evidence_collector.py --export evidence-tracker.json --format json

Automation Strategies

GRC Platforms: Vanta, Drata, Secureframe, Laika, AuditBoard -- automated evidence collection via API integrations, continuous control monitoring, auditor collaboration portals.

Infrastructure-as-Evidence: Cloud configuration snapshots (AWS Config, Azure Policy, GCP Org Policies), Terraform state as configuration evidence, Git history as change management evidence, CI/CD pipeline logs as deployment control evidence.


Infrastructure Security Validation

The agent validates infrastructure configurations against SOC 2 requirements.

Quick Reference: Infrastructure Checks

DomainKey ChecksSOC 2 Mapping
Cloud (AWS/Azure/GCP)Encryption, IAM, logging, network, backup, secretsCC6, CC7, A1, C1
DNSSPF, DKIM, DMARC, DNSSEC, CAACC6.6, CC2.2
TLS/SSLTLS 1.2+, AEAD ciphers, HSTS, auto-renewalCC6.7
EndpointMDM, disk encryption, EDR, patching, screen lockCC6.1, CC6.8, CC7.1
NetworkSegmentation, WAF, DDoS, VPN/ZTNA, egress filteringCC6.6, A1.1
ContainerImage scanning, minimal base, no privileged, RBACCC6.1, CC7.1
CI/CDSigned commits, branch protection, SAST/DAST, SBOMCC7.1, CC8.1
SecretsVault storage, rotation policies, git scanningCC6.1

For detailed per-provider control mappings, see REFERENCE.md.

Example: Infrastructure Audit Command

# Full infrastructure audit
python scripts/soc2_infrastructure_auditor.py --config infra-config.json

# Audit specific domains only
python scripts/soc2_infrastructure_auditor.py --config infra-config.json \
  --domains dns tls cloud

# JSON output with severity ratings
python scripts/soc2_infrastructure_auditor.py --config infra-config.json --format json

# Generate sample configuration template
python scripts/soc2_infrastructure_auditor.py --generate-template

Audit Timeline

Typical Timeline (First SOC 2)

PhaseDurationActivities
Scoping2-4 weeksDefine TSC, system boundaries, auditor selection
Gap Analysis2-4 weeksAssess current controls, identify gaps
Remediation8-16 weeksImplement missing controls, policies, procedures
Type I Audit2-4 weeksPoint-in-time control design assessment
Type II Observation3-12 monthsControls operate, evidence collected continuously
Type II Fieldwork2-4 weeksAuditor testing, evidence review, interviews
Report Issuance2-4 weeksDraft review, management response, final report

Annual Renewal

  • Begin renewal planning 3 months before observation period ends
  • Maintain continuous compliance between audit periods
  • Address prior-year findings before new observation period
  • Bridge letters available for gaps between reports

Incident Response Requirements

IRP Structure

  1. Preparation -- IR team defined, communication channels established, runbooks for common incidents, legal/PR contacts on retainer.
  2. Detection and Analysis -- monitoring/alerting coverage, severity classification (SEV1-SEV4), triage procedures, escalation matrix.
  3. Containment, Eradication, Recovery -- isolate affected systems, preserve evidence, identify root cause, restore and validate.
  4. Post-Incident -- blameless post-mortem within 5 business days, lessons learned, control improvements, notification assessment (MTTD, MTTR, MTTC tracking).

For severity level definitions and breach notification timelines, see REFERENCE.md.


Tools

SOC 2 Readiness Checker

# Full readiness assessment
python scripts/soc2_readiness_checker.py --config org-controls.json

# JSON output for programmatic use
python scripts/soc2_readiness_checker.py --config org-controls.json --format json

# Check specific TSC categories
python scripts/soc2_readiness_checker.py --config org-controls.json \
  --categories security availability

# Include cloud provider control mapping
python scripts/soc2_readiness_checker.py --config org-controls.json --cloud-mapping

Evidence Collector

# Generate checklist and track status
python scripts/evidence_collector.py --generate-checklist --categories all
python scripts/evidence_collector.py --status evidence-tracker.json
python scripts/evidence_collector.py --dashboard evidence-tracker.json

Infrastructure Auditor

# Validate infrastructure against SOC 2 requirements
python scripts/soc2_infrastructure_auditor.py --config infra-config.json
python scripts/soc2_infrastructure_auditor.py --config infra-config.json --format json

References

DocumentDescription
REFERENCE.mdDetailed TSC controls, infrastructure checks, access control specs, vendor management, training, IRP, BC/DR
Trust Services Criteria GuideComplete TSC reference with control objectives and audit questions
Infrastructure Security ControlsCloud, DNS, TLS, endpoint, container, CI/CD security configurations
Audit Preparation PlaybookEnd-to-end audit prep guide with timelines, checklists, cost estimation

Troubleshooting

ProblemLikely CauseResolution
Readiness checker scores are 0% across all categoriesControls JSON missing config_key values or all set to falseVerify the input JSON maps each TSC control to a boolean value under the correct config_key. Run --generate-sample > sample-config.json to see the expected structure.
Infrastructure auditor reports all checks as "fail"Infrastructure config JSON is empty or uses wrong key namesRun --generate-template to produce a valid template. Populate DNS, TLS, cloud, endpoint, and other sections with actual infrastructure state.
Evidence collector checklist missing categories--categories flag filtering outputUse --categories all to generate the complete checklist. Available categories: security, availability, processing_integrity, confidentiality, privacy.
Evidence tracker status not updatingTracker file path incorrect or file not writableVerify the path passed to --status or --update points to an existing tracker JSON file. Check file permissions.
Cloud mapping not appearing in readiness report--cloud-mapping flag not includedAdd --cloud-mapping to the readiness checker command to include AWS/Azure/GCP control mappings in the output.
Type II observation period too short for auditorObservation period is less than 3 monthsMost CPA firms require a minimum 3-month observation period for Type II. A 6-12 month period carries more weight. Plan the observation window during the scoping phase.
Auditor requests evidence not in the trackerEvidence catalog does not cover all TSC subcriteria for the selected scopeSupplement the auto-generated checklist with auditor-specific evidence requests. Each CPA firm may have additional requirements beyond the standard TSC evidence items.

Success Criteria

  • SOC 2 scope defined with all applicable TSC categories selected, system boundaries documented, and subservice organizations identified (carve-out vs inclusive)
  • Gap analysis completed with every identified gap assigned a severity rating, remediation owner, and target completion date
  • Readiness score of 80%+ across all in-scope TSC categories before engaging the CPA firm, trending to 95%+ before Type II fieldwork
  • Evidence collection framework operational with centralized repository, defined refresh cadence per TSC category, and automated collection where possible
  • Infrastructure audit passes with no critical or high-severity findings in DNS, TLS, cloud, endpoint, or access control domains
  • Type II observation period of at least 6 months with continuous control operation, quarterly self-assessments, and no significant control failures
  • Clean SOC 2 Type II opinion received with any findings addressed by management response and documented remediation plans

Scope & Limitations

In Scope:

  • SOC 2 Type I and Type II readiness assessment against all TSC categories (CC1-CC9, A1, PI1, C1, P1)
  • Infrastructure security validation (DNS, TLS, cloud, endpoint, network, container, CI/CD, secrets)
  • Evidence collection framework generation and tracking
  • Gap analysis with severity-rated findings and remediation guidance
  • Audit timeline planning and CPA firm engagement preparation
  • Incident response plan structure and requirements
  • Continuous compliance program design

Out of Scope:

  • CPA firm audit execution (the tools prepare for audit; the actual Type I/II report requires an independent CPA firm)
  • SOC 1 (ICFR) assessment (SOC 1 covers financial reporting controls, not security/availability/privacy)
  • SOC 3 report generation (SOC 3 is a public-facing summary derived from SOC 2; it requires a completed SOC 2 audit)
  • Penetration testing execution (use infrastructure-compliance-auditor or engage a third-party pentest firm)
  • GRC platform selection or implementation (the skill is compatible with Vanta, Drata, Secureframe, etc., but does not implement them)
  • Legal advice on customer contractual requirements for SOC 2 reports
  • Physical security assessments (the infrastructure auditor covers logical controls; physical data center audits require on-site assessment)

Integration Points

SkillIntegration
infrastructure-compliance-auditorProvides Vanta-level infrastructure checks across cloud, DNS, TLS, endpoints, access controls, and CI/CD that map directly to SOC 2 TSC requirements
nist-csf-specialistNIST CSF functions map to SOC 2 TSC categories; use the control mapper to build unified control matrices for organizations pursuing both
information-security-manager-iso27001ISO 27001 Annex A controls provide a management system backbone that satisfies many SOC 2 requirements; shared evidence reduces audit burden
pci-dss-specialistPCI DSS requirements overlap with SOC 2 CC6 (access), CC7 (operations), CC8 (change management); shared controls for payment-processing organizations
gdpr-dsgvo-expertGDPR requirements align with SOC 2 Privacy (P1) criteria; organizations processing EU personal data can leverage shared privacy controls
nis2-directive-specialistNIS2 minimum security measures overlap with SOC 2 security criteria; EU entities can map shared incident response, access control, and encryption controls

Tool Reference

soc2_readiness_checker.py

Evaluates organizational controls against SOC 2 Trust Services Criteria with per-category scoring.

FlagRequiredDescription
--configYes (or --generate-sample)Path to organization controls JSON file with boolean values for each TSC control
--formatNoOutput format: json for structured output, omit for human-readable text
--categoriesNoSpace-separated TSC categories to assess (e.g., security availability). Omit for all.
--cloud-mappingNoInclude cloud provider (AWS/Azure/GCP) control mappings in the output
--generate-sampleNoGenerate a sample controls JSON template (pipe to file with > sample-config.json)

evidence_collector.py

Generates evidence collection checklists and tracks evidence gathering status.

FlagRequiredDescription
--generate-checklistNoGenerate an evidence collection checklist for the specified categories
--categoriesNoSpace-separated TSC categories: security, availability, processing_integrity, confidentiality, privacy, or all
--statusNoPath to evidence tracker JSON file to display collection status
--updateNoPath to evidence tracker JSON file to update (use with --item and --status)
--itemNoEvidence item identifier to update (e.g., CC6.1-MFA)
--dashboardNoPath to evidence tracker JSON file to generate a readiness dashboard
--exportNoPath to evidence tracker JSON file to export
--formatNoExport format: json for structured output

soc2_infrastructure_auditor.py

Audits infrastructure configurations against SOC 2 requirements with severity-rated findings.

FlagRequiredDescription
--configYes (or --generate-template)Path to infrastructure configuration JSON file with DNS, TLS, cloud, endpoint, and other domain settings
--formatNoOutput format: json for structured findings with severity ratings, omit for human-readable text
--domainsNoSpace-separated infrastructure domains to audit (e.g., dns tls cloud). Omit for all domains.
--generate-templateNoGenerate a sample infrastructure configuration template (pipe to file with > infra-config.json)
ElasticFlow

Transforma tu negocio con automatización de workflows impulsada por IA. Una plataforma unificada para todas tus necesidades empresariales.

Síguenos

Plataforma

  • Funciones
  • Beneficios
  • Casos de uso
  • Biblioteca de workflows

Casos de uso

  • Ventas
  • Marketing
  • Finanzas y Legal
  • RR. HH.

Catálogo

  • Departamentos
  • Roles
  • Herramientas
  • Métricas
  • Plataformas

Crecimiento

  • Programa de referidos
  • Socios

Legal

  • Política de privacidad
  • Términos de servicio
  • Política de cookies
  • Uso aceptable
  • Seguridad
  • SLA

© 2026 ElasticFlow. Todos los derechos reservados.