Security Policy
Last Updated: December 17, 2024
1. Our Commitment to Security
At CoinShares AI, security is our top priority. We employ industry-leading security measures to protect your personal information, account credentials, and digital assets. This Security Policy outlines the comprehensive security framework we have implemented to safeguard our Platform and your funds.
We have never experienced a security breach resulting in loss of customer funds. Our security infrastructure undergoes regular third-party audits and continuous monitoring.
2. Infrastructure Security
2.1 Data Centers
Our infrastructure is hosted in enterprise-grade data centers that feature:
- SOC 2 Type II certified facilities
- ISO 27001 certified security management
- 24/7 physical security with biometric access controls
- Redundant power supplies and cooling systems
- Fire suppression and environmental monitoring
- Geographic redundancy across multiple regions
2.2 Network Security
We implement multiple layers of network protection:
- Enterprise-grade firewalls with deep packet inspection
- DDoS (Distributed Denial of Service) protection
- Intrusion Detection and Prevention Systems (IDS/IPS)
- Network segmentation and isolation
- Real-time traffic monitoring and anomaly detection
- Regular penetration testing by external security firms
2.3 Application Security
Our application security measures include:
- Web Application Firewall (WAF) protection
- OWASP Top 10 vulnerability protection
- Regular security code reviews and audits
- Automated vulnerability scanning
- Secure software development lifecycle (SDLC)
- Bug bounty program for responsible disclosure
3. Data Protection
3.1 Encryption at Rest
All sensitive data is encrypted when stored:
- 256-bit AES encryption for database storage
- Encrypted file systems for document storage
- Hardware Security Modules (HSM) for cryptographic key management
- Encrypted backups with separate key management
3.2 Encryption in Transit
All data transmitted to and from our Platform is protected:
- TLS 1.3 encryption for all connections
- Perfect Forward Secrecy (PFS) enabled
- HSTS (HTTP Strict Transport Security) enforced
- Certificate transparency monitoring
- Regular SSL/TLS configuration audits
3.3 Data Handling
We follow strict data handling protocols:
- Data minimization - only collect what's necessary
- Role-based access controls (RBAC)
- Audit logging of all data access
- Secure data deletion procedures
- Regular data protection impact assessments
4. Digital Asset Security
4.1 Cold Storage
95% of digital assets stored offline
The majority of customer funds are held in air-gapped cold storage, completely disconnected from the internet.
Our cold storage implementation includes:
- Geographic distribution across multiple secure locations
- Bank-grade vault storage facilities
- Multi-signature authorization for all transactions
- Tamper-evident security seals
- Regular audits and inventory reconciliation
4.2 Hot Wallet Security
Funds required for daily operations are protected by:
- Hardware Security Modules (HSM) for key storage
- Multi-signature wallet architecture
- Withdrawal rate limiting and monitoring
- Real-time anomaly detection
- Insurance coverage for hot wallet funds
4.3 Transaction Security
All cryptocurrency transactions are subject to:
- Multiple levels of approval for large withdrawals
- 24-48 hour delay for new withdrawal addresses
- Whitelist-only withdrawals (optional)
- Real-time transaction monitoring
- Blockchain analytics for risk assessment
5. Account Security Features
5.1 Authentication
We provide robust authentication options:
- Two-Factor Authentication (2FA): Required for all accounts, supporting TOTP authenticator apps
- Biometric Authentication: Face ID and fingerprint support on mobile devices
- Hardware Security Keys: Support for FIDO2/WebAuthn hardware keys
- Session Management: Automatic logout after inactivity
5.2 Password Security
Our password requirements and handling:
- Minimum 12 characters with complexity requirements
- Passwords hashed using bcrypt with strong cost factor
- Breach detection against known compromised password databases
- Secure password reset via email verification
- Rate limiting on login attempts
5.3 Activity Monitoring
We monitor and alert on suspicious account activity:
- Login from new devices or locations
- Multiple failed login attempts
- Unusual transaction patterns
- Security setting changes
- API key creation or usage
5.4 Additional Security Features
- Anti-Phishing Code: Custom code displayed in all legitimate emails
- Withdrawal Whitelist: Limit withdrawals to pre-approved addresses
- IP Whitelisting: Restrict account access to specific IP addresses
- Device Management: View and revoke access from trusted devices
- Login History: Complete audit trail of account access
6. Operational Security
6.1 Employee Security
Our team members undergo:
- Comprehensive background checks
- Security awareness training (quarterly)
- Principle of least privilege access
- Regular access reviews and audits
- Separation of duties for sensitive operations
- Clean desk policy and physical security protocols
6.2 Incident Response
We maintain a comprehensive incident response program:
- 24/7 Security Operations Center (SOC)
- Documented incident response procedures
- Regular incident response drills
- Clear escalation paths
- Post-incident analysis and improvement
- Customer notification procedures
6.3 Business Continuity
Our business continuity measures include:
- Redundant systems across multiple availability zones
- Regular backup and recovery testing
- Disaster recovery procedures
- Service level agreements with critical vendors
- Regular business continuity drills
7. Third-Party Security
7.1 Vendor Assessment
All third-party vendors undergo security assessment:
- Security questionnaire and documentation review
- SOC 2 or equivalent certification requirements
- Contractual security requirements
- Regular vendor security reviews
- Data processing agreements
7.2 Security Audits
Our Platform undergoes regular external audits:
- Annual penetration testing by certified security firms
- Quarterly vulnerability assessments
- Smart contract audits for blockchain integrations
- Compliance audits for regulatory requirements
- Proof of reserves audits
8. User Security Best Practices
While we implement robust security measures, your account security also depends on your actions. We strongly recommend:
8.1 Account Protection
- Enable Two-Factor Authentication immediately
- Use a strong, unique password (password manager recommended)
- Never share your login credentials with anyone
- Review your account activity regularly
- Keep your email account secure with 2FA
8.2 Phishing Prevention
- Always verify you're on the official CoinShares AI website
- Check for HTTPS and valid SSL certificate
- Set up and verify your anti-phishing code
- Never click links in unsolicited emails
- We will never ask for your password via email or chat
8.3 Device Security
- Keep your operating system and browser updated
- Use reputable antivirus/antimalware software
- Avoid accessing your account on public Wi-Fi
- Use a VPN when on untrusted networks
- Lock your device when not in use
Warning: Be extremely cautious of phishing attempts. CoinShares AI staff will NEVER ask for your password, 2FA codes, or private keys. Always verify communications through official channels.
9. Security Reporting
9.1 Report a Security Vulnerability
If you discover a security vulnerability, please report it responsibly:
Security Team Email: security@coinshares-ai.com
Please include detailed information about the vulnerability, steps to reproduce, and your contact information.
We appreciate responsible disclosure and may reward valid reports through our bug bounty program.
9.2 Report Suspicious Activity
If you notice suspicious activity on your account or suspect a security incident:
- Immediately change your password
- Review and revoke unauthorized sessions
- Contact our support team at support@coinshares-ai.com
- Enable withdrawal whitelist if not already active
9.3 Bug Bounty Program
We maintain a bug bounty program to reward security researchers who help improve our security. Eligible vulnerabilities may qualify for rewards based on severity and impact.
10. Compliance and Certifications
We maintain compliance with industry standards and regulations:
- SOC 2 Type II compliant infrastructure
- GDPR compliance for data protection
- PCI DSS compliant payment processing
- Regular third-party security audits
- Proof of reserves verification
11. Contact Information
For security-related inquiries:
Security Team: security@coinshares-ai.com
General Support: support@coinshares-ai.com
For urgent security matters, please indicate "URGENT" in the subject line. Our security team monitors reports 24/7.