🔐Security stack

The security architecture of the DCM platform ensures robust protection for interbank transactions and payment processing, as confirmed by a report from the independent company UNIONFLAME. Inspections conducted according to OWASP, PCI, NIST, and OSSTMM standards revealed no critical vulnerabilities, affirming compliance with modern security requirements.

Key Security Features

  1. Authentication and Authorization

    • JWT-based Authentication: JSON Web Tokens (JWT) provide API request authentication through secure encoding of information. Each token is signed with a private key and verified using a public key, ensuring secure and authorized communication.

    • Session Token Management: Each session token undergoes validation to maintain secure interactions and prevent unauthorized activity.

  2. Data Encryption and Personal Data Protection

    • AES-256 Encryption: Confidential data, including user information and transaction records, is encrypted using AES-256 for complete security.

    • Public/Private Key Infrastructure (RS256): Data is encrypted using a public key, ensuring access is restricted to the private key owner.

    • SHA-256 Hashing: Transaction attributes and confidential keys are hashed to ensure data integrity.

    • Base64 Encoding: Encrypted data is encoded for secure transmission through the API.

  3. Secure Communication

    • HTTPS and TLS 1.3: All data during transmission is encrypted with modern protocols, guaranteeing confidentiality and integrity.

    • CSRF Protection: Protects against cross-site request forgery by verifying referer hosts for all requests.

  4. Dedicated Infrastructure

    • Unique Hosts for Each Participant: Each participant is assigned a unique host and identifier, enhancing traceability and data isolation.

  5. Additional Features

    • Regulatory Compliance: Fully compliant with ISO 20022 and GDPR standards, ensuring comprehensive security and privacy.

Key Advantages

  • Real-Time Security: Instant data verification and protection.

  • End-to-End Encryption: All confidential data is protected throughout its lifecycle.

  • Immutable Data: Replication of digital records in a distributed network ensures full transparency and auditability.

  • Cost Reduction: Optimized operations reduce overhead and enhance scalability.

  • Integration-Friendly: Easily integrates with existing financial systems.

Technology Stack

  • Encryption Protocols: AES-256, RSA-256, SHA-256.

  • Authentication: JWT for secure API requests.