viewfoot
PlatformUse CasesFeaturesGuidesSecurityFAQ
PricingDocsBlog
⌘K
viewfoot
TermsPrivacy

Company

  • About
  • Enterprise
  • Terms
  • Privacy

Product

  • Security
  • Customers
  • Changelog
  • Pricing

Docs

  • Introduction
  • Getting Started
  • Player Guide
  • Recruiter Workflow

© 2026 viewfoot. All rights reserved.
Built by 3noP

Overview

IntroductionPlatform OverviewValue Proposition

Use Cases

Clubs & AcademiesScouts & AgenciesPlayers

Features

Progress HubMatch Annotation WorkspaceRecruiter WorkspaceTalent DiscoveryPlatform Services

Resources

Getting StartedFAQSecurityData PrivacyRelease Notes

Guides

Player Account & VerificationMatch Annotation GuideCapturing Quality FootageRecruiter Wishlist Workflow
Docs
Security

Security

Security practices, protections and governance in viewfoot.

Security

Principles

  • Defense in depth
  • Minimum necessary access
  • Explicit boundaries & auditability
  • Privacy-by-design

Controls

DomainControl
AuthOAuth + short-lived sessions + rotation
DataAt-rest AES-256, TLS 1.3 in transit
AccessRole / scope based policy engine
AuditImmutable event trail + anomaly flags
IsolationNamespaced tenancy boundaries

Application Layer

  • Secure headers & strict CSP
  • Rate limiting & abuse detection
  • Input validation & schema enforcement

Infrastructure

  • Segmented networks & least-privilege IAM
  • Continuous vulnerability scanning
  • Automated patch & dependency review

Data Governance

  • Retention policies per entity class
  • Subject access & erasure workflows
  • Encryption key lifecycle management

Incident Response

  • 24/7 monitoring pipeline
  • Defined escalation runbooks
  • Postmortem with corrective action tracking

Security is an ongoing discipline embedded in our engineering process.


FAQData Privacy