Skip to content

Security at CERNIQ

Your institution's financial data deserves the highest level of protection. Here's how we safeguard it.

Encryption

AES-256 at rest, TLS 1.3 in transit. All financial data encrypted before storage.

Access Control

Role-based access (RBAC) with 12 institutional roles. API keys with SHA-256 hashing and automatic expiration.

Audit Logging

Every data access, modification, and report generation is logged with user ID, IP, and timestamp. Logs retained for 7 years.

Infrastructure

Hosted on SOC 2-compliant infrastructure with automated backups, DDoS protection, and geo-redundancy.

Compliance

Platform designed for COSSEC, NCUA, and Basel III regulatory frameworks. Reports meet examiner requirements.

Vulnerability Management

Regular dependency scanning, penetration testing, and security code reviews. Responsible disclosure program available.

Report a Vulnerability

If you discover a security vulnerability, please report it responsibly.

security@cerniq.io