Loading...
ATreasury by AltislyATreasury by Altisly

Security & Compliance

Enterprise-grade protection for treasury operations, settlement data, and financial workflows. Built for teams that need auditable, regulation-ready infrastructure.

Security Built Into Every Layer

Atreasury handles real money movement. Security is not an add-on — it is the foundation every feature is built on.

End-to-End Encryption

All data is encrypted at rest (AES-256) and in transit (TLS 1.3). Sensitive fields like API keys and credentials use additional envelope encryption.

Role-Based Access Control

Granular permissions at the module, action, and record level. Every user action is scoped to their role, department, and organizational boundary.

Full Audit Trail

Every action — trade approvals, settlement executions, compliance decisions, rate changes — is logged with timestamp, user identity, and IP address.

Real-Time Monitoring

Continuous monitoring of system health, login anomalies, failed auth attempts, and suspicious activity patterns across all tenant boundaries.

Isolated Deployments

Enterprise customers can run fully isolated instances with dedicated databases, private networking, and customer-managed encryption keys.

Session Security

JWT-based authentication with automatic token rotation, session timeouts, concurrent session limits, and forced re-authentication for sensitive operations.

Compliance Frameworks & Standards

Atreasury is designed to meet and exceed the compliance standards expected by regulated financial institutions and enterprise treasury teams.

Aligned
SOC 2 Type II
  • Security, availability, and confidentiality controls
  • Annual third-party audits and penetration testing
  • Documented incident response procedures
  • Segregation of duties across environments
Compliant
GDPR / Data Privacy
  • Data processing agreements for all EU operations
  • Right to erasure and data portability support
  • Data minimization by design
  • Cross-border transfer safeguards
In Progress
ISO 27001
  • Information security management system (ISMS)
  • Risk assessment and treatment protocols
  • Continuous improvement framework
  • Asset inventory and classification
Aligned
Financial Regulatory
  • Sanctions screening and PEP monitoring
  • KYC/AML workflow automation
  • Transaction monitoring and suspicious activity reporting
  • Regulatory reporting readiness for CBN, FCA, and similar bodies
Aligned
PCI DSS Awareness
  • No direct storage of card numbers or CVVs
  • Tokenized payment references only
  • Network segmentation for payment flows
  • Quarterly vulnerability scans
Active
Business Continuity
  • Automated daily backups with encrypted offsite storage
  • Disaster recovery plan with documented RTO/RPO
  • Multi-region failover capability
  • Annual BC/DR testing and tabletop exercises

Data Protection & Privacy

Your treasury data is the most sensitive asset in your organization. Here is exactly how we protect it.

Encryption at Rest

All databases use AES-256 encryption. Backups are encrypted before transfer to offsite storage. Encryption keys are rotated on a scheduled basis.

Encryption in Transit

All communication between clients, APIs, and internal services is secured with TLS 1.3. Certificate pinning is available for mobile and API integrations.

Data Residency Controls

Dedicated deployment options allow customers to specify data residency regions. No data leaves the chosen jurisdiction without explicit configuration.

Tenant Isolation

Shared environments use row-level security with mandatory organization scoping. Isolated environments provide fully separate databases and application instances.

Automated Backups

Point-in-time recovery with daily full backups and continuous WAL archiving. Backup retention follows customer-configurable policies (default: 30 days).

Data Retention & Deletion

Configurable retention policies per data type. Automated purge workflows for expired records. Full data export available before account closure.

Infrastructure & Application Security

From code to production, every layer of the Atreasury stack is hardened against modern threats.

Container Orchestration

Production workloads run in containerized environments with automated scaling, health checks, and zero-downtime deployments.

Network Segmentation

Application, database, and cache layers are deployed in separate network segments. Public endpoints are protected by WAF and rate limiting.

DDoS Protection

Multi-layer DDoS mitigation at the network edge. Automatic traffic anomaly detection and geo-based blocking capabilities.

Vulnerability Management

Automated dependency scanning on every build. Container image scanning before deployment. Quarterly external penetration testing.

Secrets Management

All secrets, API keys, and credentials are stored in encrypted vaults. No secrets in source code, environment files, or container images.

Observability Stack

Centralized logging, distributed tracing, and real-time metrics across all services. Alert escalation for security-relevant events.

Need a Security Review?

We provide detailed security documentation, architecture diagrams, and direct access to our engineering team for enterprise security assessments.