The security architecture of the DCM platform ensures robust protection for interbank transactions and payment processing, as confirmed by a from the independent company UNIONFLAME. Inspections conducted according to OWASP, PCI, NIST, and OSSTMM standards revealed no critical vulnerabilities, affirming compliance with modern security requirements.
Key Security Features
Authentication and Authorization
JWT-based Authentication: JSON Web Tokens (JWT) provide API request authentication through secure encoding of information. Each token is signed with a private key and verified using a public key, ensuring secure and authorized communication.
Session Token Management: Each session token undergoes validation to maintain secure interactions and prevent unauthorized activity.
Data Encryption and Personal Data Protection
AES-256 Encryption: Confidential data, including user information and transaction records, is encrypted using AES-256 for complete security.
Public/Private Key Infrastructure (RS256): Data is encrypted using a public key, ensuring access is restricted to the private key owner.
SHA-256 Hashing: Transaction attributes and confidential keys are hashed to ensure data integrity.
Base64 Encoding: Encrypted data is encoded for secure transmission through the API.
Secure Communication
HTTPS and TLS 1.3: All data during transmission is encrypted with modern protocols, guaranteeing confidentiality and integrity.
CSRF Protection: Protects against cross-site request forgery by verifying referer hosts for all requests.
Dedicated Infrastructure
Unique Hosts for Each Participant: Each participant is assigned a unique host and identifier, enhancing traceability and data isolation.
Additional Features
Regulatory Compliance: Fully compliant with ISO 20022 and GDPR standards, ensuring comprehensive security and privacy.
Key Advantages
Real-Time Security: Instant data verification and protection.
End-to-End Encryption: All confidential data is protected throughout its lifecycle.
Immutable Data: Replication of digital records in a distributed network ensures full transparency and auditability.
Cost Reduction: Optimized operations reduce overhead and enhance scalability.
Integration-Friendly: Easily integrates with existing financial systems.
Technology Stack
Encryption Protocols: AES-256, RSA-256, SHA-256.
Authentication: JWT for secure API requests.