Security

Protecting Assets, Data, and Trust

At atWallets, security is at the core of everything we build. We apply industry-standard technical safeguards, strong operational processes, and continuous monitoring to protect customer assets, data, and our operations.

Our Security Principles

Confidentiality & Integrity

Ensuring the confidentiality, accuracy, and integrity of data is our top priority.

Least Privilege

System access is granted following the principle of least privilege.

Continuous Monitoring & Improvement

We monitor systems 24/7 to prevent incidents and continually improve security.

Infrastructure & Network Security

security image
Cloud Provider — AWS

Our production infrastructure is hosted on AWS, leveraging its security features such as virtualization, network segmentation, and IAM roles/policies.

security image
CDN & DDoS Protection — Cloudflare

All traffic is routed through Cloudflare, adding protection against DDoS attacks and providing WAF-level application security.

security image
Network Segmentation

Databases, application servers, and administrative access are isolated across separate network layers.

Identity & Access Management

security image
MFA / 2FA

Multi-factor authentication is required for all administrative and operational access.

security image
IAM & Role-Based Access

AWS IAM policies enforce the principle of least privilege across services and users.

security image
Secure Key Management

Cryptographic and API keys are managed using secure vaults and KMS solutions.

Monitoring, Logging & Incident Response

security image
24/7 Monitoring

Logs and telemetry are centralized and monitored; anomalies are automatically flagged.

security image
Incident Response Plan

We have predefined processes for responding quickly to security incidents, including user notification procedures when necessary.

Backup & Disaster Recovery

security image
Regular Backups

Critical data and configurations are backed up automatically and encrypted.

security image
Disaster Recovery

Recovery testing is performed against defined RTO/RPO objectives.

Third-Party & Supply Chain

security image
Vendor Review

Critical third-party services (e.g., cloud, CDN, protection services) undergo regular reviews and contractual security assessments.

Audits, Testing & Transparency

security image
Independent Reviews & Penetration Testing

We conduct periodic penetration tests and security evaluations.

As we build the ecosystem, we embed security at its core

atWallets has implemented its security practices on AWS and Cloudflare infrastructure. Data is protected with AES-256 encryption.

FAQS

Frequently asked questions

We haveput together some commonly asked questions

Didn’t find what you’re looking for? Contact Sales

Security Feedback & Reports

For all security-related inquiries or responsible disclosures, contact us at:

[email protected]
contact-us

Contact us to design a custom package tailored for your business.

Let us help you find the right product.

Contact the sales team