Security & Infrastructure
Built for regulated digital markets
Defense-in-depth across architecture, data, and operations. Compliance by design with auditable controls, encryption everywhere, and enterprise-grade observability.
Reference architecture (MVP)
Next.js + NestJS, Postgres (RLS multi-tenant), Redis (BullMQ), S3/MinIO, Docker, single-region EU.
Web: Next.js (App Router)
API: NestJS
DB: Postgres + RLS
Cache/Jobs: Redis + BullMQ
Storage: S3/MinIO
Observability: OpenTelemetry
Auth: OIDC + short-lived JWT
Infra: Docker (compose) → Cloud
Encryption
In transit & at rest, keys rotated
- TLS 1.2+ everywhere; HSTS; modern ciphers.
- Data at rest encrypted (DB, object storage, backups).
- Key rotation policy; split custody for secrets.
Secrets & key management
Short-lived tokens, least privilege
- Short-lived JWT; rotating refresh; session binding.
- Env secrets rotated and audited; no secrets in code.
- Separate KMS per environment; 4-eyes on key changes.
Data protection (GDPR)
PII minimization and residency
- Data minimization; explicit purposes; retention policies.
- EU data residency; SCCs for sub-processors; DPA in place.
- Data subject rights tooling: export/delete upon request.
Backups & disaster recovery
RPO/RTO targets with regular testing
- Automated daily snapshots; point-in-time restore.
- Cross-storage redundancy; quarterly recovery drills.
- Documented RPO/RTO; immutable backup copies.
Observability & monitoring
Traces, metrics, logs with SLOs
- OpenTelemetry tracing; p95 latency tracked.
- Error budgets & SLOs; on-call with runbooks.
- Immutable audit logs for sensitive actions.
Vulnerabilities & pentest
Regular scans, third-party testing, SLAs
- Automated SCA/SAST in CI; dependency pinning.
- Annual external pentest; remediation SLAs by severity.
- Secure coding standards; supply-chain controls.
Access control
Least privilege & 4-eyes approvals
- RBAC across services; JIT admin; MFA enforced.
- 4-eyes for payouts, wallet addresses, and key changes.
- Periodic access reviews; session anomaly detection.
Compliance mapping
EU-first: MiCA, DLT Pilot, GDPR; plus local regimes
- Policies aligned with MiCA and EU DLT Pilot considerations.
- Jurisdictional allowlists/limits; investor categorization.
- Surveillance & reporting hooks for regulators/partners.
Incident response
Playbooks, RACI, and post-mortems
- 24/7 escalation tree; severity classifications; comms templates.
- Forensics workflow; customer notification SLAs.
- Blameless post-mortems with tracked action items.
Status & uptime
Public page for uptime and incidents
We maintain a public status page with real-time uptime and latency metrics, plus incident history.
View statusResponsible disclosure & bug bounty
Secure channels, scope, and rewards
- Coordinated vulnerability disclosure (CVD) policy with PGP.
- Clear scope: apps, APIs, infrastructure; exclusions listed.
- Reward tiers by impact/severity; response time targets.
Do you support data deletion/export for GDPR?
Yes. We provide data subject request workflows and audit trails for exports and deletions.
What are your pentest and remediation SLAs?
Annual external tests minimum; critical findings triaged immediately with fix SLAs based on severity.
Where is data hosted?
EU region by default; single-region to start with options for expansion and redundancy.
Important
This page summarizes our current baseline controls and target architecture. Some features depend on jurisdiction, partners, and rollout stage. For a signed security package, request the latest documentation.