Security
How we protect your data and operations.
Last updated: April 1, 2026
Infrastructure
The Ozone platform is hosted on enterprise-grade cloud infrastructure with multi-region redundancy. All environments are isolated using virtual private clouds with strict network segmentation. Production systems are deployed across multiple availability zones to ensure high availability and disaster recovery readiness.
Encryption
All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption. Encryption keys are managed through hardware security modules (HSMs) with automatic key rotation. Database backups are encrypted and stored in geographically separate locations.
Access Control
The platform implements role-based access control (RBAC) and attribute-based access control (ABAC) to enforce the principle of least privilege. Multi-factor authentication is required for all administrative access. Session management includes automatic timeouts and device-based verification.
- SSO integration via SAML 2.0 and OpenID Connect.
- Granular permission models with tenant-level isolation.
- Time-bound access tokens with automatic revocation.
- IP allowlisting and geo-restriction capabilities.
Application Security
Our development process follows secure coding practices aligned with the OWASP Top 10. All code changes undergo peer review and automated security scanning before deployment. We conduct regular penetration testing through independent third-party security firms.
- Static application security testing (SAST) in the CI/CD pipeline.
- Dynamic application security testing (DAST) against staging environments.
- Dependency vulnerability scanning with automated patching.
- Container image scanning and runtime protection.
Monitoring and Incident Response
We maintain 24/7 security monitoring with automated threat detection and alerting. Our incident response plan follows industry best practices and is tested regularly through tabletop exercises and simulated breach scenarios.
- Real-time log aggregation and anomaly detection.
- Automated alerting for suspicious access patterns.
- Defined escalation procedures with target response times.
- Post-incident review process with root cause analysis.
Compliance
Ozone maintains compliance with industry-recognized security frameworks and undergoes regular independent audits to validate our controls.
Annual audit covering security, availability, and confidentiality trust service criteria.
Information security management system certification — currently undergoing implementation and audit preparation.
Full compliance with European data protection regulations including data processing agreements.
Configurable data residency controls to meet regional regulatory requirements.
Audit Trails
All platform operations generate immutable audit logs that capture user actions, system events, and data access. Audit logs are retained in accordance with regulatory requirements and are available for export and integration with your existing SIEM systems.
Business Continuity
Our business continuity and disaster recovery plans are designed to maintain service availability with a recovery time objective (RTO) of less than 4 hours and a recovery point objective (RPO) of less than 1 hour. Plans are tested quarterly and updated based on findings.
Responsible Disclosure
We welcome security researchers to report vulnerabilities through our responsible disclosure program. Please send reports to security@ozone.cash. We commit to acknowledging reports within 24 hours and providing updates on remediation progress.
Contact
For security-related inquiries, contact our security team at security@ozone.cash.