Security Policy
Last updated: June 15, 2024
Our Commitment to Security
At TradingServ, we understand that security is paramount in the financial trading industry. We implement enterprise-grade security measures across our entire infrastructure to protect your trading operations, personal data, and financial information from unauthorized access, breaches, and cyber threats.
Our security framework is built on industry best practices and continuously updated to address emerging threats and vulnerabilities in the rapidly evolving cybersecurity landscape.
Infrastructure Security
Our data centers are located in Tier-IV facilities with 24/7 surveillance, biometric access controls, redundant power systems, and environmental monitoring. Only authorized personnel have physical access to server infrastructure.
We employ multiple layers of network security including:
- Enterprise-grade DDoS protection (up to 2 Tbps mitigation capacity)
- Stateful firewall systems with real-time threat detection
- Intrusion Detection and Prevention Systems (IDPS)
- Network segmentation and isolation between customer environments
- Encrypted communication channels (TLS 1.3) for all data transmission
All our trading servers are hardened according to CIS benchmarks and include:
- Regular security patching and vulnerability management
- Automated malware scanning and removal
- File integrity monitoring and change detection
- Secure boot and kernel-level protection
- Isolated virtual environments for each customer
Data Security
We implement strong encryption protocols to protect your data both in transit and at rest:
- In Transit: AES-256 encryption with TLS 1.3 for all communications
- At Rest: AES-256 encryption for all stored data and backups
- Key Management: Hardware Security Modules (HSM) for cryptographic key storage
Strict access controls are enforced to ensure only authorized personnel can access customer data:
- Role-based access control (RBAC) with principle of least privilege
- Multi-factor authentication (MFA) for all administrative access
- Comprehensive audit logging and monitoring of all data access
- Regular access reviews and permission audits
We maintain robust backup and disaster recovery procedures:
- Daily encrypted backups with 30-day retention period
- Geographically distributed backup storage
- Regular backup restoration testing
- Automated backup verification and integrity checks
Application Security
Our trading robots and applications are developed following secure coding practices:
- OWASP Top 10 compliance for web applications
- Regular code reviews and security testing
- Static and dynamic application security testing (SAST/DAST)
- Dependency scanning for vulnerable third-party libraries
Our automated trading robots include multiple security layers:
- Code obfuscation and anti-reverse engineering protection
- Secure API authentication and authorization
- Input validation and output encoding to prevent injection attacks
- Real-time monitoring for anomalous trading behavior
Compliance and Certifications
We maintain compliance with relevant industry regulations and standards:
- GDPR (General Data Protection Regulation) compliant
- PCI DSS compliant for payment processing
- ISO/IEC 27001:2013 information security management
- SOC 2 Type II compliance (in progress)
Our security posture is regularly validated through independent assessments:
- Annual penetration testing by certified security firms
- Quarterly vulnerability assessments
- Continuous security monitoring and threat intelligence
- Regular security architecture reviews
Incident Response
We employ 24/7 security monitoring and threat detection:
- Security Information and Event Management (SIEM) system
- Real-time anomaly detection and alerting
- Automated incident response playbooks
- Dedicated Security Operations Center (SOC)
In the unlikely event of a security incident, we have a comprehensive response plan:
- Immediate containment and investigation procedures
- Rapid notification to affected customers (within 72 hours as required by GDPR)
- Post-incident analysis and remediation
- Continuous improvement of security controls based on lessons learned
Customer Security Responsibilities
While we provide a secure infrastructure, customers also have important security responsibilities:
- Use strong, unique passwords and enable two-factor authentication
- Keep trading platform software and operating systems updated
- Regularly review account activity and trading logs
- Secure API keys and never share credentials
- Implement proper risk management in trading strategies
Security Contact
If you discover a security vulnerability or have security-related concerns, please contact us immediately:
We operate a responsible disclosure program and will work with security researchers to address any reported vulnerabilities promptly.