Skip to main content

Security Factsheet

Security Architecture

Data Protection

  • Encryption at Rest: AES-256 encryption
  • Encryption in Transit: TLS 1.3
  • Key Management: HSM-based key storage
  • Data Masking: PII protection
  • Tokenization: Sensitive data replacement

Access Control

  • Authentication: Multi-factor authentication (MFA)
  • Authorization: Role-based access control (RBAC)
  • Session Management: Secure token handling
  • Password Policy: Complexity requirements
  • Account Lockout: Brute force protection

Network Security

  • Firewall: Web application firewall (WAF)
  • DDoS Protection: Rate limiting and filtering
  • VPN Access: Secure remote connectivity
  • Network Segmentation: DMZ architecture
  • Intrusion Detection: IDS/IPS systems

Compliance Certifications

Industry Standards

✅ SOC 2 Type II ✅ ISO 27001:2013 ✅ ISO 27017:2015 ✅ ISO 27018:2019 ✅ PCI DSS Level 1

Regulatory Compliance

✅ GDPR (EU) ✅ CCPA (California) ✅ APRA (Australia) ✅ MAS (Singapore) ✅ FCA (UK)

Financial Regulations

✅ ASIC RG 133 ✅ SEC Rule 17a-4 ✅ MiFID II ✅ Dodd-Frank ✅ Basel III

Security Features

Monitoring & Logging

  • 24/7 security monitoring
  • Real-time threat detection
  • Security incident response
  • Audit logging
  • SIEM integration

Vulnerability Management

  • Regular penetration testing
  • Vulnerability scanning
  • Security patches
  • Code analysis
  • Dependency scanning

Business Continuity

  • Disaster recovery plan
  • Data backup (hourly)
  • Geographic redundancy
  • RTO: 4 hours
  • RPO: 1 hour

Data Governance

  • Data classification
  • Retention policies
  • Right to be forgotten
  • Data portability
  • Privacy by design

Security Controls

Application Security

  • Input validation
  • Output encoding
  • SQL injection prevention
  • XSS protection
  • CSRF tokens

Infrastructure Security

  • Hardened OS
  • Container security
  • Secrets management
  • Patch management
  • Configuration management

Security documentation and audit reports available upon request.