Store security
In this section
Best practices against virtual attacksErasing customer dataEnabling two-factor authentication loginEnable HTTPS throughout the siteData subject rightsBest practices for using application keysBest practices to avoid scams using the VTEX brandManaging HTTP headersBest practices for store access managementHow to prevent your site from being cloned