Security program
Creative teams rely on Genify for client assets, internal IP, and launch campaigns. We design every system to protect that trust. Highlights of the program are below; reach out via support for vendor questionnaires or deeper reviews.
Hosting & network
- Core API and asset workers run on AWS within private VPC subnets.
- Ingress is fronted by Cloudflare for DDoS shielding and TLS termination.
- Internal services communicate over mutual TLS with short-lived certificates.
Data protection
- All user uploads, prompts, and results are encrypted at rest (AES-256) via AWS KMS.
- Secrets (Stripe keys, model credentials) are stored in AWS Secrets Manager with rotation.
- Backups are encrypted, point-in-time recoverable, and retained for 30 days.
Access controls
- Production access is limited to the Genify core team via SSO + hardware MFA.
- Admin actions (plan changes, community moderation) are logged with user and timestamp metadata.
- Background jobs run with least-privilege IAM roles; no shared root credentials.
Application security
- Automated dependency scanning and weekly patch cadence for backend services.
- Rate limiting across auth, library, and checkout to prevent brute-force abuse.
- User-generated content passes image and text safety checks before community publication.
Responsible disclosure
If you discover a vulnerability, email security@genifystudio.com with reproduction details. Please avoid automated denial-of-service testing. We acknowledge reports within two business days and coordinate transparent fixes. Critical issues receive priority handling with follow-up in our changelog.