Security
Store security
- Best practices against virtual attacks
- Erasing customer data
- Enabling two-factor authentication login
- Enable HTTPS throughout the site
- Data subject rights
- Best practices for using application keys
- Best practices to avoid scams using the VTEX brand
- Managing HTTP headers
- Best practices for store access management
- How to prevent your site from being cloned
Platform security resources
Information security compliance
- Risk Assessment
- Penetration tests
- Security Incident Response Plan
- Reporting vulnerabilities
- VTEX information security and privacy certificates
