Security at CERNIQ
Your institution's financial data deserves the highest level of protection. Here's how we safeguard it.
Encryption
AES-256 at rest, TLS 1.3 in transit. All financial data encrypted before storage.
Access Control
Role-based access (RBAC) with 12 institutional roles. API keys with SHA-256 hashing and automatic expiration.
Audit Logging
Every data access, modification, and report generation is logged with user ID, IP, and timestamp. Logs retained for 7 years.
Infrastructure
Hosted on SOC 2-compliant infrastructure with automated backups, DDoS protection, and geo-redundancy.
Compliance
Platform designed for COSSEC, NCUA, and Basel III regulatory frameworks. Reports meet examiner requirements.
Vulnerability Management
Regular dependency scanning, penetration testing, and security code reviews. Responsible disclosure program available.
Report a Vulnerability
If you discover a security vulnerability, please report it responsibly.
security@cerniq.io