Skip to content

Information Security Policy

Source: Notion | Last edited: 2025-12-16 | ID: 1442d2dc-3ef...


  • Implementation of role-based access control (RBAC) to enforce the minimum privilege principle.
  • Mandatory multi-factor authentication (MFA) for all accounts and critical systems.
  • Use of secure password managers (1Password) to manage and share credentials safely.
  • End-to-end encryption for all data in transit using TLS/SSL protocols.
  • Encryption of sensitive data at rest using AES-256 standards.
  • Segregation of sensitive data (API Keys, credentials) in encrypted databases or AWS services (e.g., AWS KMS, Secrets Manager).
  • Separate environments for development, testing, and production, with strict controls on cross-environment access.
  • Continuous monitoring and auditing using AWS CloudTrail and CloudWatch.
  • Secured S3 buckets with server-side encryption enabled and access restricted to necessary personnel.
  • Use of AWS IAM roles and policies to ensure granular access control.
  • Regular patching and updates of AWS resources and services.
  • Dedicated, secure servers or cloud instances for trading operations.
  • Encrypted hard drives (e.g., FileVault) on all workstations and servers.
  • Physically secure office locations with access control systems for critical hardware.

Development and Training Environment Security

Section titled “Development and Training Environment Security”
  • Secure CI/CD pipelines with automated code scans for vulnerabilities (e.g., Github Workflow).
  • Regular code reviews and penetration testing for critical components.
  • Sandboxed environments for model training to prevent interference with production systems.
  • Centralized credential management using AWS Secrets Manager.
  • Strict policies for managing API keys, with regular key rotation and usage monitoring.
  • Cryptographic signing of transactions to ensure integrity in trading systems.
  • Real-time security monitoring with alerts for abnormal activity (e.g., AWS Incident Manager).
  • Documented incident response plan with defined roles and escalation procedures.
  • Regular security drills to test incident response readiness.
  • Security assessments of third-party vendors and partners.
  • Use of vetted, secure libraries and dependencies in software development.
  • Legal agreements to ensure third-party compliance with security standards.
  • Mandatory security awareness training for all employees, covering topics like phishing and social engineering.
  • Enforcing strict policies for the secure handling of sensitive information.
  • Regular audits to ensure compliance with data protection regulations (e.g., GDPR).
  • Deployment of firewalls and intrusion detection/prevention systems (IDS/IPS) for network traffic monitoring.
  • Use of VPNs for secure remote access to internal systems.
  • Regular vulnerability scanning and penetration testing of network infrastructure.