Security
Built on the same principles
we help you implement.
Decern handles sensitive compliance data for crypto fintechs and MSBs. Our infrastructure, development practices, and data handling are designed to meet the security expectations of teams operating under FinCEN requirements.
Last reviewed: April 2026
Infrastructure & hosting
Google Cloud Platform
FedRAMP authorized, SOC 2 Type 2, ISO 27001, PCI DSS compliant. All infrastructure managed with Terraform.
Neon (Managed Postgres)
SOC 2 Type 2, ISO 27001, ISO 27701. AES-256 at rest, TLS 1.2+ in transit. HackerOne pen testing.
Cloudflare
WAF, DDoS protection, TLS termination, and CDN for all traffic and static assets.
All infrastructure is defined in Terraform and version-controlled. Infrastructure changes go through the same peer-review process as application code, providing a full audit trail.
Data isolation
Decern is multi-tenant by design. Every database query includes an org_id filter
enforced at the repository layer — not the handler layer — so tenant isolation cannot be
bypassed by application logic. No cross-tenant data access is possible through the API.
Encryption
At rest
AES-256 via Neon. GCP services encrypt at rest by default.
In transit
TLS everywhere. HTTPS enforced via Cloudflare with HSTS headers.
Application-level
API keys hashed with bcrypt. Plaintext shown once at creation, never stored.
Field-level encryption for PII and wallet addresses at the application layer is on our
roadmap. Currently these fields are protected by Neon's volume-level AES-256 encryption
and tenant isolation via org_id scoping.
Development practices
- Branch protections —
masteris always deployable with no direct pushes. All changes go through peer-reviewed PRs. - Automated testing — Integration tests run against real databases, not mocks. Linting and type checking enforced in CI.
- Infrastructure as code — Terraform for all infrastructure. Every change is version-controlled, reviewed, and auditable.
- Squash merge only — One commit per PR for a clean, auditable history.
Access control
- Least privilege — Production access is currently limited to a single founder. As the team scales, we will enforce role-based access with SSO and documented access approval workflows.
- Secrets management — GCP Secret Manager for all sensitive configuration. No secrets in code or environment files.
- Scoped API keys — Keys can be restricted to specific permission sets to limit blast radius.
- SSO authentication — WorkOS AuthKit for dashboard access with enterprise SSO support.
Incident response
As a founder-led company, incident response is currently handled directly by the founder with 24/7 alerting via GCP Cloud Monitoring and Sentry for application errors. Every alert routes to a single on-call individual — there's no ambiguity about ownership.
- 1 Detection — GCP alerting and Sentry surface issues immediately
- 2 Containment — Isolate affected systems, prevent further impact
- 3 Resolution — Fix the root cause, not just the symptoms
- 4 Communication — Notify affected customers with clear impact and remediation details
- 5 Post-mortem — Document what happened and how we prevent recurrence
Service availability is continuously monitored via an independent platform with a public status page. As the team grows, we will formalize on-call rotations and escalation procedures.
Logging & audit trail
API request logs
All API requests captured with structured logging — method, path, status, latency, requesting org, and API key identifier. Minimum 5-year retention per BSA requirements.
Action audit logs
Screening decisions, alert events, case actions, SAR filings, config changes, role changes, and access events. Append-only, immutable, retained for a minimum of 5 years per BSA requirements.
Audit logs are stored in PostgreSQL for queryable access and dashboard views, and written to WORM (Write Once, Read Many) blob storage as the immutable source of truth. This is the same audit logging infrastructure we provide to our customers.
Backup & disaster recovery
Neon provides continuous backup with point-in-time recovery, allowing restoration to any point within the last 30 days.
RPO
Minutes of data loss in a worst-case scenario.
RTO
Recovery can be initiated immediately with minimal downtime.
Infrastructure is fully defined in Terraform, so the entire stack can be reproduced from code in a new environment if needed.
Dependency management
- Go modules — Dependency integrity verified via Go module checksums.
- Node.js — Lock files pinned and committed. Automated dependency updates via Dependabot.
- Terraform providers — Version-pinned in configuration.
- Automated scanning — Dependabot monitors all repositories for known vulnerabilities and opens PRs for updates.
SOC 2 roadmap
Formal SOC 2 Type 2 certification is on our roadmap. We're building with SOC 2 controls in mind from day one — branch protections, audit logging, access controls, and infrastructure-as-code are all foundations that make the eventual audit straightforward rather than a retrofit.
Questions about our security posture?
We're happy to walk through our practices in detail.
logan@getdecern.com