Security
Protecting Assets, Data, and Trust
At atWallets, security is at the core of everything we build. We apply industry-standard technical safeguards, strong operational processes, and continuous monitoring to protect customer assets, data, and our operations.
Our Security Principles
Confidentiality & Integrity
Ensuring the confidentiality, accuracy, and integrity of data is our top priority.
Least Privilege
System access is granted following the principle of least privilege.
Continuous Monitoring & Improvement
We monitor systems 24/7 to prevent incidents and continually improve security.
Infrastructure & Network Security

Cloud Provider — AWS
Our production infrastructure is hosted on AWS, leveraging its security features such as virtualization, network segmentation, and IAM roles/policies.

CDN & DDoS Protection — Cloudflare
All traffic is routed through Cloudflare, adding protection against DDoS attacks and providing WAF-level application security.

Network Segmentation
Databases, application servers, and administrative access are isolated across separate network layers.
Identity & Access Management

MFA / 2FA
Multi-factor authentication is required for all administrative and operational access.

IAM & Role-Based Access
AWS IAM policies enforce the principle of least privilege across services and users.

Secure Key Management
Cryptographic and API keys are managed using secure vaults and KMS solutions.
Monitoring, Logging & Incident Response

24/7 Monitoring
Logs and telemetry are centralized and monitored; anomalies are automatically flagged.

Incident Response Plan
We have predefined processes for responding quickly to security incidents, including user notification procedures when necessary.
Backup & Disaster Recovery

Regular Backups
Critical data and configurations are backed up automatically and encrypted.

Disaster Recovery
Recovery testing is performed against defined RTO/RPO objectives.
Third-Party & Supply Chain

Vendor Review
Critical third-party services (e.g., cloud, CDN, protection services) undergo regular reviews and contractual security assessments.
Audits, Testing & Transparency

Independent Reviews & Penetration Testing
We conduct periodic penetration tests and security evaluations.
As we build the ecosystem, we embed security at its core
atWallets has implemented its security practices on AWS and Cloudflare infrastructure. Data is protected with AES-256 encryption.
Frequently asked questions
We haveput together some commonly asked questions
Security Feedback & Reports
For all security-related inquiries or responsible disclosures, contact us at:
[email protected]
Contact us to design a custom package tailored for your business.
Let us help you find the right product.
Contact the sales team