Institutional-grade security, designed for private markets.
Monolith Equity is built with defense-in-depth: strict access controls, auditable operations, and resilient infrastructure. We prioritize clarity: what we do, why we do it, and how controls are enforced.
Controls
Core security controls
A practical overview of the controls that matter most for private market workflows: identity, access, data integrity, and operational accountability.
Infrastructure
Reference architecture
A clear, modern stack with separation of concerns. We prioritize observability and reliability alongside security.
Principle
Minimize attack surface
Expose only what’s necessary, keep boundaries clear, reduce implicit trust.
Principle
Make actions accountable
Audit sensitive operations and maintain traceability for incident response.
Principle
Operate with discipline
Monitoring, alerts, and runbooks reduce downtime and incident impact.
Access
Access, permissions, and approvals
Private markets require strict guardrails. Sensitive actions are protected with role boundaries and explicit approvals.
Data
Data protection & privacy
We aim to minimize exposure of sensitive information and ensure consistent protection across storage, transit, and access.
Privacy
Clear documentation on data handling
See our privacy details and cookies policy in the Legal hub.
Operations
Monitoring, alerting, and incident response
Security is not only design — it’s operations. We monitor, respond, and continuously improve based on real-world signals.
Disclosure
Responsible disclosure
If you believe you’ve found a security issue, please report it responsibly. We’ll acknowledge receipt and work toward a fix.
Report security issues
Use the channel below and include reproduction details.
Include
- Steps to reproduce, expected vs observed behavior
- Affected URLs/endpoints, screenshots/logs if relevant
- Impact assessment (what could an attacker do?)
Please avoid
- Accessing data that isn’t yours
- Disrupting service availability
- Public disclosure before coordination
Contact
security@monolith.xyz
If you don’t have a dedicated channel yet, use our primary contact and mention “Security report”.
We aim to acknowledge reports promptly and coordinate responsibly. Timing depends on severity and scope.
Next
Want the full picture?
Browse the Help Center for practical workflows and guidance.