Legal

Security

Last updated: March 27, 2026

Infrastructure

Figurative runs on hardened cloud infrastructure with encryption at rest (AES-256) and in transit (TLS 1.3). Our compute and storage layers are deployed across multiple availability zones for redundancy and resilience.

Data Isolation

Each customer's data is logically isolated using row-level security policies enforced at the database layer. There is no cross-tenant data access by design. API keys and credentials are encrypted and stored separately from application data.

Access Control

Internal access to production systems follows the principle of least privilege. All access requires multi-factor authentication and is logged for audit purposes. We conduct regular access reviews and revoke credentials promptly upon role changes.

Application Security

Our development process includes automated security scanning, dependency vulnerability monitoring, and code review requirements. We follow OWASP best practices and perform regular penetration testing of our platform.

Incident Response

We maintain an incident response plan with defined escalation procedures. In the event of a security incident affecting your data, we will notify affected parties within 72 hours in accordance with applicable regulations.

Responsible Disclosure

If you discover a security vulnerability, please report it responsibly to security@figurative.cloud. We appreciate the security research community and will acknowledge valid reports promptly.