Your designs and data
are secure with Figr

Trusted by product teams everywhere to design, iterate, and ship their software.

We're built to secure your intellectual property

Secure Infrastructure

We host all of our data in physically secure, U.S.-based Amazon Web Services (AWS) facilities that include 24/7 on-site security and access monitoring.

Data Encryption in transit & at rest

All data sent to or from Figr is encrypted using Transport Layer Security (TLS) and HTTP Strict Transport Security (HSTS), and all customer data is encrypted using AES-256.

Access Controls

Access to customer data is limited to functions with a business requirement to do so. Access to environments that contain customer data requires a series of authentication and authorization controls, including multi-factor authentication (MFA). Figr enforces the principles of least privilege and need-to-know for access to customer data, and access to those environments is monitored and logged for security purposes.

Data Redundancy and Backup

Figr's infrastructure has been designed to be fault tolerant. All databases operate in a cluster configuration and the application tier scales using load balancing technology that dynamically meets demand.

We hold our employees to the highest standards

Security Policies and Incident Response

Figr keeps updated security policies to address changing security needs. These policies are available to employees for training and reference on the company's internal platform.

Onboarding and Offboarding Procedures

New hires at Figr undergo background checks and are required to complete security awareness training during onboarding and annually thereafter. When an employee leaves, we immediately disable their access to devices, apps, and company resources through Figr's identity and device management tools.

Continuous Security Training

The Security Team at Figr regularly educates employees about new security threats and conducts phishing awareness campaigns.

Office Security

Figr has a program to handle visitor management, office access control, and general office security.

Build with security in mind from the ground up

Secure Development Lifecycle

Code development is done through a documented SDLC process, and every change is tracked via GitHub. Automated controls ensure changes are peer-reviewed and pass an internal security review before being deployed to production.

Rigorous product design and security testing

Our projects pass thorough security-design reviews, threat models, and regular penetration tests using trusted security vendors. Additionally, we consistently perform threat modeling exercises to stay ahead of potential security risks.

Application monitoring and protection

All app access is logged and audited. We also use a wide variety of solutions to quickly identify and eliminate threats, including:

  • Web Application Firewall (WAF) protection
  • Real-time anomaly detection
  • Automated vulnerability scanning
  • DDoS mitigation

Third-party vendor security review

We ensure that all of our third-party apps and providers meet our security and data protection standards before using them.

Customer Control Over Data

Data Management

Customers maintain complete control over their data within Figr's platform, including:

  • Export designs in multiple formats (Figma, JSON, HTML)
  • Bulk export capabilities for enterprise accounts
  • Self-service data deletion
  • Project-level access controls

Privacy by Design

Your data is yours to own. Figr does not sell customer data or use your proprietary designs to improve models serving other customers.

Subprocessors

We ensure that all of our third-party apps and providers meet our security data protection standards before using them.

Privacy Policy

See figr.design/privacy for our latest policy.

Enterprise Security Features

Single Sign-On (SSO)

SAML 2.0 integration with popular identity providers including Okta, Azure AD, and Google Workspace.

Audit Logs

Comprehensive audit trails for all design activities, user access, and administrative changes with immutable logging.

Custom Security Controls

Custom security controls include:

  • IP allowlisting
  • Session timeout controls
  • Password complexity requirements
  • Two-factor authentication enforcement

Frequently asked questions

How often are security audits conducted?
Chevron Down

We undergo annual SOC 2 Type II audits through our compliance platform Sprinto, with additional quarterly internal security assessments and annual penetration testing.

Can we review your security documentation?
Chevron Down

Yes. Enterprise customers can request our security package including our SOC 2 report, security questionnaire responses, and technical architecture overview.

How do you handle security incidents?
Chevron Down

We follow documented incident response procedures with defined SLAs. Customers are notified within 72 hours of any confirmed incident affecting their data.

What about AI and design-specific security?
Chevron Down

We implement strict model isolation, ensuring your designs and product context remain private. Generated designs are never shared across accounts, and we maintain audit trails for all AI interactions.

Do you support on-premise deployment?
Chevron Down

Yes, we provide on-premise deployment options for enterprise customers with specific security or compliance requirements. Contact our team to discuss your deployment needs.