Legal
Security
Last updated: March 27, 2026
Infrastructure
Figurative runs on hardened cloud infrastructure with encryption at rest (AES-256) and in transit (TLS 1.3). Our compute and storage layers are deployed across multiple availability zones for redundancy and resilience.
Data Isolation
Each customer's data is logically isolated using row-level security policies enforced at the database layer. There is no cross-tenant data access by design. API keys and credentials are encrypted and stored separately from application data.
Access Control
Internal access to production systems follows the principle of least privilege. All access requires multi-factor authentication and is logged for audit purposes. We conduct regular access reviews and revoke credentials promptly upon role changes.
Application Security
Our development process includes automated security scanning, dependency vulnerability monitoring, and code review requirements. We follow OWASP best practices and perform regular penetration testing of our platform.
Incident Response
We maintain an incident response plan with defined escalation procedures. In the event of a security incident affecting your data, we will notify affected parties within 72 hours in accordance with applicable regulations.
Responsible Disclosure
If you discover a security vulnerability, please report it responsibly to security@figurative.cloud. We appreciate the security research community and will acknowledge valid reports promptly.