Security

Security Overview

Last updated: March 14, 2026

How we approach protecting your data, accounts, and the platform.

Security is a shared responsibility. We implement industry-recognized controls across infrastructure, application layers, and operations.

Encryption in transit

TLS

Encryption at rest

AES-256

Image storage

Private buckets

Access control

RBAC

Uptime SLA

99.9%

Compliance

Enterprise ready

Encryption and data protection

Data in transit is protected using TLS. Sensitive data at rest is encrypted using modern algorithms and key management practices appropriate to the environment.

Access control and authentication

Administrative access is restricted, logged, and reviewed on a least-privilege basis. We support strong customer authentication options where available.

Monitoring and vulnerability management

We monitor systems for anomalies, maintain patching processes, and perform security testing aligned with risk.

Incident response

We maintain an incident response process to detect, contain, and recover from security events. Where required, we will notify affected customers.

Your responsibilities

You should protect account credentials, limit sharing of API keys, configure permissions appropriately, and report suspected compromise promptly.

Contact

contact@virtualstagedesign.com

Support 24/7
Security — Virtual Staging | AI Virtual Staging