As Asia’s leading digital asset custodian, security at Rakkar is paramount. Our dedication to safeguarding digital assets is reflected in the esteemed security excellence certifications and attestations we have obtained including the coveted ISO 27001, SOC 1 Type 1, SOC 2 Type 1 & 2. These credentials underscore our commitment to providing the highest level of security and operational excellence across multiple areas such as privacy, integrity, transparency and more. Let’s explore the significance of each certification and what each of them means for institutional clients.
SOC 1 Type 1: Ensuring Financial Reporting Integrity
System and Organization Controls (SOC) are designed to provide public and confidential information to users of Rakkar’s services. This provides information about the level of security that applies to specific aspects of certain services that Rakkar provides.
Our SOC 1 Type 1 attestation verifies that Rakkar has effective controls in place over financial reporting, which is crucial for our institutional clients. This attestation assures clients that financial data is handled with integrity and accuracy, a cornerstone of our digital asset custody platform. The audit assesses the design and implementation of controls at a specific point in time, highlighting our commitment to secure and reliable financial reporting processes.
SOC 2 Type 1 & 2: Comprehensive Data Protection
The SOC 2 Type 1 attestation demonstrates our adherence to the Trust Services Criteria relevant to security, availability, and confidentiality. This ensures that our security controls are designed to manage and protect client data effectively. The SOC 2 Type 2 attestation further validates the operational effectiveness of these controls over time, reinforcing our platform’s capability to maintain comprehensive data protection.
ISO 27001: International Standard for Information Security
ISO 27001 is an internationally recognized standard for information security management. Achieving this certification confirms that we have established a robust information security management system (ISMS) that meets the stringent ISO requirements. This systematic approach to managing sensitive information ensures its confidentiality, integrity, and availability, which is integral to the operations of our digital asset custody platform.
Our Security Design and How It Impacts You
Achieving these certifications is more than just accolades; they are a testament to the operations and reliability of our digital asset custody solutions. Here are a few ways on how we safeguard your assets in a secure and compliant manner:
Secure and Reliable Custody
- MPC-CMP Technology: We utilize state-of-the-art MPC-CMP technology to decentralize private keys, ensuring no single party has complete access to the key. This mitigates the risk of a single point of failure and enhances the overall security of our custody solutions.
- Fast Identity Online (FIDO): We utilize FIDO authentication, which enhances security by enabling password-less logins using biometric features. FIDO not only streamlines the user experience but also provides a more robust defense against unauthorized access.
- Client-Initiated Transactions Only: Rakkar staff does not have the ability to initiate transactions; all transactions can only be initiated from clients
- Biometric Access: Secure rooms and vaults are accessible only to authorized personnel through biometric authentication
- 24/7 Monitoring: Our secure rooms are monitored 24/7 to maintain the highest security standards.
Governance and Transparency
- Customizable Policy Engine: Clients can configure account and vault-level policies to meet governance and security requirements. This provides full control over vault access and key operation approvals.
- Fully Segregated Wallets: Assets are stored in segregated vaults, providing transparency and allowing clients to easily prove ownership of their assets.
Compliance and Accountability
- Transaction Screening: We implement Know Your Transaction (KYT) practices to block suspicious deposits and prevent transfers to high-risk addresses, ensuring compliance with regulatory standards.
- Activity Records: Detailed records of activities and transactions from creation to approval, rejection, cancellation, or failure are maintained, increasing accountability within organizations.
Our Assurance to Our Institutional Clients
These security certifications are a testament to our unwavering commitment and dedication to security and compliance excellence. Our institutional clients are assured that their digital assets are protected by the highest standards of excellence, empowering clients to navigate the digital assets space with utmost confidence.
Please visit our trust center for more details on our security certifications and how it impacts you.