Security

At X-Gateway, we’ve taken the following steps to ensure the highest industry standards of security for our products and services:

  1. Data Encryption: We encrypt all our data both at rest (database encryption) and in transit(TLS/SSL). In addition to that we store sensitive data, such as wallet credentials in a dedicated store for secrets - Hashicorp Vault.

  2. Authentication and Authorization: Our multi-factor authentication (MFA) and role-based access control (RBAC) ensure secure access for authorized users.

  3. Input Validation: We sanitize and validate all user inputs to prevent injection attacks like SQL injection and Cross-Site Scripting (XSS).

  4. OWASP Top Ten: Performing penetration tests to address the OWASP Top Ten risks is a regular practice for us, safeguarding against common security threats.

  5. Regular Audits: Conducting routine security audits is a key part of our strategy, validating the effectiveness of our security measures.

  6. Regular Patching and Updates: We consistently keep our dependencies up-to-date with the latest security patches to prevent vulnerabilities.

  7. Secure Development Lifecycle: Our development team adheres to secure coding practices, conducts regular code reviews, and employs advanced analysis tools.

  8. API Security: Robust authentication and proper input validation ensure the security of our APIs.

  9. Logging and Monitoring: We employ comprehensive logging and monitoring, promptly responding to any potential security incidents.

  10. Secure Network Configuration: Our services and databases run in private subnets, thus are not available on the broader internet by desing. All outbound communication happens through NAT gateways, all inbound traffic is securely routed through load balancers.

  11. Incident Response Plan: A well-defined incident response plan guides our actions in case of a security breach, minimizing potential impact.

  12. Employee Training: Our team is well-trained in security best practices and adept at recognizing and responding to social engineering threats.

Last updated