Store securityIn this sectionBest practices against virtual attacksBest practices for store access managementBest practices for using API keysBest practices to avoid scams using the VTEX brandData subject rightsEnable HTTPS throughout the siteErasing customer dataHow to prevent your site from being clonedManaging HTTP headers