Security
Store security
- Best practices against virtual attacks
- Erasing customer data
- Enabling two-factor authentication login
- Enable HTTPS throughout the site
- Data subject rights
- Best practices for using application keys
- Best practices to avoid scams using the VTEX brand
- Synonym list
- Managing HTTP headers