Security is a first-class concern at Archomata. Our platform is designed with defence-in-depth principles, ensuring that multiple independent layers of protection guard your data and trading operations. This document outlines our security architecture and the measures in place to keep your information safe.

AES-256
Encryption at rest
TLS 1.3
Encryption in transit
7 Roles
Granular RBAC

Encryption at Rest

All data stored in our PostgreSQL database is encrypted using AES-256 encryption. This includes trading data, account configurations, user credentials, and audit logs. Database backups are also encrypted before being stored.

Authentication

Archomata uses a dual authentication system. User sessions are managed through JWT tokens, while MT5 bridge agents authenticate using API keys. These are separate systems with distinct security properties.

Role-Based Access Control

Access to platform resources is controlled through a layered permission system. Users are assigned roles either directly or through groups, and permissions are resolved as the union of all assigned roles.

CSRF Protection

Cross-Site Request Forgery protection is implemented as middleware in the FastAPI application. This prevents attackers from tricking authenticated users into making unintended requests through malicious websites.

Rate Limiting

Rate limiting protects the platform from brute-force attacks and abuse. It is applied using an in-memory sliding window algorithm on sensitive endpoints.

Audit Logging

Every significant action on the platform is recorded in a structured audit log. This provides a complete trail of who did what, when, and from where.

Multi-tenancy Isolation

Archomata is a multi-tenant platform where each organisation's data is logically isolated. This isolation is enforced at the database query level, ensuring that no tenant can access another tenant's data.

For security questions, vulnerability reports, or to request a detailed security assessment, contact us at contact@archomata.com.