Security

Built on the same principles
we help you implement.

Decern handles sensitive compliance data for crypto fintechs and MSBs. Our infrastructure, development practices, and data handling are designed to meet the security expectations of teams operating under FinCEN requirements.

Last reviewed: April 2026

Infrastructure & hosting

Google Cloud Platform

FedRAMP authorized, SOC 2 Type 2, ISO 27001, PCI DSS compliant. All infrastructure managed with Terraform.

Neon (Managed Postgres)

SOC 2 Type 2, ISO 27001, ISO 27701. AES-256 at rest, TLS 1.2+ in transit. HackerOne pen testing.

Cloudflare

WAF, DDoS protection, TLS termination, and CDN for all traffic and static assets.

All infrastructure is defined in Terraform and version-controlled. Infrastructure changes go through the same peer-review process as application code, providing a full audit trail.

Data isolation

Decern is multi-tenant by design. Every database query includes an org_id filter enforced at the repository layer — not the handler layer — so tenant isolation cannot be bypassed by application logic. No cross-tenant data access is possible through the API.

Encryption

At rest

AES-256 via Neon. GCP services encrypt at rest by default.

In transit

TLS everywhere. HTTPS enforced via Cloudflare with HSTS headers.

Application-level

API keys hashed with bcrypt. Plaintext shown once at creation, never stored.

Field-level encryption for PII and wallet addresses at the application layer is on our roadmap. Currently these fields are protected by Neon's volume-level AES-256 encryption and tenant isolation via org_id scoping.

Development practices

  • Branch protectionsmaster is always deployable with no direct pushes. All changes go through peer-reviewed PRs.
  • Automated testing — Integration tests run against real databases, not mocks. Linting and type checking enforced in CI.
  • Infrastructure as code — Terraform for all infrastructure. Every change is version-controlled, reviewed, and auditable.
  • Squash merge only — One commit per PR for a clean, auditable history.

Access control

  • Least privilege — Production access is currently limited to a single founder. As the team scales, we will enforce role-based access with SSO and documented access approval workflows.
  • Secrets management — GCP Secret Manager for all sensitive configuration. No secrets in code or environment files.
  • Scoped API keys — Keys can be restricted to specific permission sets to limit blast radius.
  • SSO authentication — WorkOS AuthKit for dashboard access with enterprise SSO support.

Incident response

As a founder-led company, incident response is currently handled directly by the founder with 24/7 alerting via GCP Cloud Monitoring and Sentry for application errors. Every alert routes to a single on-call individual — there's no ambiguity about ownership.

  1. 1 Detection — GCP alerting and Sentry surface issues immediately
  2. 2 Containment — Isolate affected systems, prevent further impact
  3. 3 Resolution — Fix the root cause, not just the symptoms
  4. 4 Communication — Notify affected customers with clear impact and remediation details
  5. 5 Post-mortem — Document what happened and how we prevent recurrence

Service availability is continuously monitored via an independent platform with a public status page. As the team grows, we will formalize on-call rotations and escalation procedures.

Logging & audit trail

API request logs

All API requests captured with structured logging — method, path, status, latency, requesting org, and API key identifier. Minimum 5-year retention per BSA requirements.

Action audit logs

Screening decisions, alert events, case actions, SAR filings, config changes, role changes, and access events. Append-only, immutable, retained for a minimum of 5 years per BSA requirements.

Audit logs are stored in PostgreSQL for queryable access and dashboard views, and written to WORM (Write Once, Read Many) blob storage as the immutable source of truth. This is the same audit logging infrastructure we provide to our customers.

Backup & disaster recovery

Neon provides continuous backup with point-in-time recovery, allowing restoration to any point within the last 30 days.

RPO

Minutes of data loss in a worst-case scenario.

RTO

Recovery can be initiated immediately with minimal downtime.

Infrastructure is fully defined in Terraform, so the entire stack can be reproduced from code in a new environment if needed.

Dependency management

  • Go modules — Dependency integrity verified via Go module checksums.
  • Node.js — Lock files pinned and committed. Automated dependency updates via Dependabot.
  • Terraform providers — Version-pinned in configuration.
  • Automated scanning — Dependabot monitors all repositories for known vulnerabilities and opens PRs for updates.

SOC 2 roadmap

Formal SOC 2 Type 2 certification is on our roadmap. We're building with SOC 2 controls in mind from day one — branch protections, audit logging, access controls, and infrastructure-as-code are all foundations that make the eventual audit straightforward rather than a retrofit.

Questions about our security posture?

We're happy to walk through our practices in detail.

logan@getdecern.com