At atWallets, security is at the core of everything we build. We apply industry-standard technical safeguards, strong operational processes, and continuous monitoring to protect customer assets, data, and our operations.
Ensuring the confidentiality, accuracy, and integrity of data is our top priority.
System access is granted following the principle of least privilege.
We monitor systems 24/7 to prevent incidents and continually improve security.
Our production infrastructure is hosted on AWS, leveraging its security features such as virtualization, network segmentation, and IAM roles/policies.
All traffic is routed through Cloudflare, adding protection against DDoS attacks and providing WAF-level application security.
Databases, application servers, and administrative access are isolated across separate network layers.
Multi-factor authentication is required for all administrative and operational access.
AWS IAM policies enforce the principle of least privilege across services and users.
Cryptographic and API keys are managed using secure vaults and KMS solutions.
Logs and telemetry are centralized and monitored; anomalies are automatically flagged.
We have predefined processes for responding quickly to security incidents, including user notification procedures when necessary.
Critical data and configurations are backed up automatically and encrypted.
Recovery testing is performed against defined RTO/RPO objectives.
Critical third-party services (e.g., cloud, CDN, protection services) undergo regular reviews and contractual security assessments.
We conduct periodic penetration tests and security evaluations.
atWallets has implemented its security practices on AWS and Cloudflare infrastructure. Data is protected with AES-256 encryption.
We haveput together some commonly asked questions
For all security-related inquiries or responsible disclosures, contact us at:
[email protected]Let us help you find the right product.
Contact the sales team