Use this page as a central governance hub for Speckle workspace operations. It helps technical leads, IT, security, and procurement teams align on controls, ownership, and rollout decisions.Documentation Index
Fetch the complete documentation index at: https://docs.speckle.systems/llms.txt
Use this file to discover all available pages before exploring further.
Who this is for
- Workspace admins defining guardrails for delivery teams
- IT and security teams reviewing enterprise controls
- Procurement and compliance teams reviewing assurance evidence
- Project leads setting sharing policies for external collaboration
Governance scope at a glance
This page consolidates:- Plan-linked governance capability boundaries
- Identity and access management controls
- Data location and deployment model choices
- Secure sharing controls for links and tokens
- Compliance assurance context, including SOC 2
Plan and control boundaries
Speckle governance capabilities vary by plan. Use these summaries to choose a fit before implementation detail.Explore
- Best for evaluation and lightweight proof-of-concept use
- Basic workspace controls
- Not intended for enterprise identity/compliance requirements
Team
- Best for active project delivery with broader collaboration
- Higher operational limits
- Suitable when governance requirements are moderate and contractual controls are not required
Enterprise
- Best for regulated and scaled production environments
- Advanced governance controls such as SSO, SCIM, and data residency
- Deployment and commercial options that support stronger assurance workflows
Identity and access governance
Manage identity and authorization at workspace level first, then refine at project level where needed.- Authorize by role with Roles and seats
- Control onboarding and offboarding with Inviting
- Reduce account-claim risk with Domain protection
- Centralize authentication via SSO
- Automate user lifecycle with SCIM
Data governance and deployment choices
For regulated environments, combine workspace controls with hosting and regional requirements.- Keep data in required regions with Data residency
- Review enterprise network and operational setup in IT Setup Guide
- Choose cloud or self-hosted operating model using Cloud vs self-hosted Speckle
Secure sharing governance model
Speckle supports tokenized sharing for models, presentations, and dashboards. Treat these links as governed access paths, not one-off convenience URLs. Minimum recommended policy:- Apply expiration dates to all external links by default
- Require passwords for sensitive or externally distributed links
- Require meaningful labels for issued links (owner, purpose, expiry intent)
- Revoke links immediately when access purpose ends
- Review active tokens on a fixed cadence (for example weekly or monthly)
- Models and embeds: Share your models
- Presentations: Presentation
- Dashboards: Layout and sharing
SOC 2 and compliance context
Speckle supports enterprise governance programs through platform controls and deployment options. Speckle’s SOC 2 attestation is current and covers the current reporting year. SOC 2 documentation is available to Enterprise prospect customers as part of the security and procurement review process. Request access via [email protected].Common operating patterns
Pattern 1: Internal delivery workspace
- Primary focus: project throughput with controlled team access
- Typical controls: role governance, invitation policy, periodic token review
- Typical plans: Team or Enterprise
Pattern 2: Client-facing collaboration workspace
- Primary focus: frequent external sharing and presentation
- Typical controls: mandatory link expiry, password-protected external links, strict token revocation cadence
- Typical plans: Team or Enterprise
Pattern 3: Regulated enterprise workspace
- Primary focus: identity integration, compliance evidence, data location
- Typical controls: SSO, SCIM, residency strategy, formal access governance
- Typical plans: Enterprise
Governance rollout checklist
Use this checklist when setting up a new governed workspace:- Confirm required plan and commercial terms.
- Configure workspace roles and invitation policy.
- Set up SSO and SCIM where required.
- Confirm data residency and hosting model requirements.
- Define secure sharing rules (expiry, password, revocation cadence).
- Assign token review ownership and review frequency.
- Record compliance evidence requirements (for example SOC 2 package request).
FAQ
Commercial model and plans
Is Speckle open source, commercial, or both?
Is Speckle open source, commercial, or both?
What is the governance difference between open source and commercial deployments?
What is the governance difference between open source and commercial deployments?
Can we start on open source and move to commercial later?
Can we start on open source and move to commercial later?
How should we choose between Team and Enterprise for governance?
How should we choose between Team and Enterprise for governance?
Are plan limits and governance controls the same thing?
Are plan limits and governance controls the same thing?
ACC integration governance
Does ACC data get copied into Speckle SaaS?
Does ACC data get copied into Speckle SaaS?
Does Speckle change data in ACC?
Does Speckle change data in ACC?
Whose permissions do ACC syncs use?
Whose permissions do ACC syncs use?
Security and compliance controls
What encryption is available (at rest and in transit)?
What encryption is available (at rest and in transit)?
Can security-sensitive design data leave our controlled tenant boundary?
Can security-sensitive design data leave our controlled tenant boundary?
Can we enforce data residency or regional storage (for example Australia)?
Can we enforce data residency or regional storage (for example Australia)?
Do you provide a current SOC 2 Type II report (or equivalent assurance)?
Do you provide a current SOC 2 Type II report (or equivalent assurance)?
Sharing, audit, and operational resilience
Can public or anonymous sharing be restricted or disabled?
Can public or anonymous sharing be restricted or disabled?
Is audit logging available for support monitoring and compliance requirements?
Is audit logging available for support monitoring and compliance requirements?
How are backups and disaster recovery handled?
How are backups and disaster recovery handled?
Can Speckle support air-gapped or isolated recovery requirements?
Can Speckle support air-gapped or isolated recovery requirements?
Do you publish RPO/RTO targets publicly?
Do you publish RPO/RTO targets publicly?
Implementation baseline
What should our team define before go-live for backup and recovery?
What should our team define before go-live for backup and recovery?
- Backup frequency and retention policy.
- Restore testing cadence and acceptance criteria.
- Named recovery owners and escalation path.
- Target RPO and RTO aligned to business impact.
- Evidence artifacts required for audits.
- A documented failover and communication runbook.
What is the minimum governance setup before production rollout?
What is the minimum governance setup before production rollout?
- Confirm plan and contractual governance requirements.
- Configure roles, invitation policy, and ownership.
- Enable SSO, then SCIM, if centralized identity lifecycle is required.
- Confirm data residency and hosting model.
- Enforce external sharing controls (expiry, password, token review and revocation cadence).
- Record compliance evidence contacts and review cadence.